Login / Signup
How to Abuse and Fix Authenticated Encryption Without Key Commitment.
Ange Albertini
Thai Duong
Shay Gueron
Stefan Kölbl
Atul Luykx
Sophie Schmieg
Published in:
IACR Cryptol. ePrint Arch. (2020)
Keyphrases
</>
data mining
key exchange
high security
case study
data sets
website
relational databases
formal model
digital signature
data encryption