Login / Signup
Secure Comparison Protocol with Encrypted Output and the Computation for Proceeding 2 Bits-by-2 Bits.
Takumi Kobayashi
Keisuke Hakuta
Published in:
WISA (2018)
Keyphrases
</>
security protocols
authentication protocol
security analysis
cryptographic protocols
lightweight
encryption scheme
group communication
secure communication
diffie hellman
security requirements
security mechanisms
error correcting codes
encryption decryption
key agreement
secure routing