Login / Signup

Two-Key Triple Encryption.

Ivan DamgårdLars R. Knudsen
Published in: J. Cryptol. (1998)
Keyphrases
  • high security
  • real time
  • neural network
  • information retrieval
  • social networks
  • multimedia
  • private key