Login / Signup
Strong Converse Theorem for Source Encryption under Side-Channel Attacks.
Yasutada Oohama
Bagus Santoso
Published in:
CoRR (2022)
Keyphrases
</>
encryption algorithms
secret key
real time
artificial intelligence
smart card
encryption scheme
key management