Login / Signup
Tight Lower Bound on Linear Authenticated Encryption.
Charanjit S. Jutla
Published in:
IACR Cryptol. ePrint Arch. (2002)
Keyphrases
</>
lower bound
upper bound
branch and bound
branch and bound algorithm
key exchange
worst case
optimal solution
lower and upper bounds
objective function
np hard
lower bounding
security analysis
encryption algorithms
key management
data encryption