Login / Signup
with Cryptographic Applications.
Robi Pedersen
Osmanbey Uzunkol
Published in:
IACR Cryptol. ePrint Arch. (2021)
Keyphrases
</>
smart card
security protocols
hash functions
random number generator
learning algorithm
data structure
s box
encryption key
knowledge base
web services
bayesian networks
digital signature
security properties
cryptographic algorithms