Login / Signup
Adaptively Secure Constrained Pseudorandom Functions.
Dennis Hofheinz
Akshay Kamath
Venkata Koppula
Brent Waters
Published in:
Financial Cryptography (2019)
Keyphrases
</>
pseudorandom
stream cipher
secret key
uniformly distributed
random number
authentication scheme
database
random numbers
key management
query processing
basis functions
security requirements
security mechanisms
encryption algorithm
user authentication
security level