Login / Signup
On the CCA1-Security of Elgamal and Damgård's Elgamal.
Helger Lipmaa
Published in:
IACR Cryptol. ePrint Arch. (2008)
Keyphrases
</>
access control
functional requirements
neural network
information security
security issues
data sets
intrusion detection
security policies
security mechanisms
data security
security properties
security vulnerabilities