Login / Signup
Hash-based encryption system.
Mohammad Peyravian
Allen Roginsky
Nevenko Zunic
Published in:
Comput. Secur. (1999)
Keyphrases
</>
transitive closure
encryption algorithms
secret key
encryption algorithm
image encryption
hash functions
encryption scheme
data encryption standard
information hiding
data distribution
security analysis
key exchange
encryption decryption
multi dimensional
join algorithms
high security