Login / Signup
Non-Malleable Codes with Leakage and Applications to Secure Communication.
Fuchun Lin
Reihaneh Safavi-Naini
Mahdi Cheraghchi
Huaxiong Wang
Published in:
CoRR (2017)
Keyphrases
</>
secure communication
smart card
secret key
secret sharing
public key
security protocols
ad hoc networks
key management
network security
digital signature
error correction
chaotic systems
secret sharing scheme
end to end