Login / Signup
Multi-key Authenticated Encryption with Corruptions: Reductions Are Lossy.
Tibor Jager
Martijn Stam
Ryan Stanley-Oakes
Bogdan Warinschi
Published in:
TCC (1) (2017)
Keyphrases
</>
key exchange
high security
data sets
encryption algorithm
neural network
secret key
security analysis
private key
image encryption
random number
key exchange protocol
encryption algorithms
data encryption standard