Login / Signup
A Modular Approach to the Security Analysis of Two-Permutation Constructions.
Yu Long Chen
Published in:
ASIACRYPT (1) (2022)
Keyphrases
</>
security analysis
smart card
security requirements
public key
encryption scheme
authentication protocol
security model
security properties
image encryption
high security
encryption algorithm
user authentication
databases
information security
proxy signature scheme
authentication scheme
security mechanisms
image quality