Login / Signup
On the (Im)Possibility of Key Dependent Encryption.
Iftach Haitner
Thomas Holenstein
Published in:
IACR Cryptol. ePrint Arch. (2008)
Keyphrases
</>
high security
databases
security properties
genetic algorithm
information systems
private key
data encryption standard