Sign in

Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance.

Viet Tung HoangReza ReyhanitabarPhillip RogawayDamian Vizár
Published in: CRYPTO (1) (2015)
Keyphrases
  • key exchange
  • online learning
  • anomaly detection
  • real time
  • neural network
  • secret key
  • key management
  • security analysis
  • image encryption
  • encryption algorithms