Login / Signup
Clock Control Sequence Reconstruction in the Ciphertext Only Attack Scenario.
Slobodan Petrovic
Amparo Fúster-Sabater
Published in:
ICICS (2004)
Keyphrases
</>
ciphertext
secret key
standard model
pseudorandom
access structure
public key
encryption scheme
proxy re encryption
encryption algorithm
image reconstruction
power consumption
private key
identity based encryption
real time
databases
data model