Login / Signup
Secure two-party computation with AES-128: Generic approach and exploiting specific properties of functions approach.
A. Anasuya Threse Innocent
K. Sangeeta
Published in:
ICADIWT (2014)
Keyphrases
</>
advanced encryption standard
cryptographic algorithms
domain specific
data sets
security issues
secret key
neural network
application specific
security protocols
data security
block cipher
secure communication
data encryption
scalar product