Login / Signup
Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance.
Viet Tung Hoang
Reza Reyhanitabar
Phillip Rogaway
Damian Vizár
Published in:
CRYPTO (1) (2015)
Keyphrases
</>
key exchange
online learning
anomaly detection
real time
neural network
secret key
key management
security analysis
image encryption
encryption algorithms