Login / Signup
Security Analysis of ElGamal Implementations.
Mohamad El Laz
Benjamin Grégoire
Tamara Rezk
Published in:
ICETE (2) (2020)
Keyphrases
</>
security analysis
smart card
public key
security model
security requirements
high security
security properties
user authentication
image encryption
encryption scheme
databases
proxy signature scheme
authentication scheme
private key
privacy preserving
motion estimation
multiresolution
data mining