Login / Signup
A Mode of Operation with Partial Encryption and Message Integrity.
Philip Hawkes
Gregory G. Rose
Published in:
IACR Cryptol. ePrint Arch. (2003)
Keyphrases
</>
data confidentiality
data protection
integrity verification
email
integrity constraints
integrity checking
database
databases
neural network
key management
cryptographic protocols
image encryption
key exchange