Login / Signup
Certificate-Based Encryption Resilient to Key Leakage.
Qihong Yu
Jiguo Li
Yichen Zhang
Wei Wu
Xinyi Huang
Yang Xiang
Published in:
IACR Cryptol. ePrint Arch. (2015)
Keyphrases
</>
high security
image encryption
data encryption standard
data sets
genetic algorithm
case study
secure communication
public key infrastructure