Login / Signup
Encryption against Storage-Bounded Adversaries from On-Line Strong Extractors.
Chi-Jen Lu
Published in:
J. Cryptol. (2004)
Keyphrases
</>
network communication
data storage
storage and retrieval
storage space
key management
databases
cloud storage
storage management
ciphertext
random access
file system
encryption scheme
storage requirements
relational databases
image encryption
information systems
database
data encryption