Login / Signup
Is Public-Key Encryption Based on LPN Practical?
Ivan Damgård
Sunoo Park
Published in:
IACR Cryptol. ePrint Arch. (2012)
Keyphrases
</>
public key encryption
databases
information systems
proxy re encryption