Login / Signup
Encryption Schemes Secure under Related-Key and Key-Dependent Message Attacks.
Florian Böhl
Gareth T. Davies
Dennis Hofheinz
Published in:
Public Key Cryptography (2014)
Keyphrases
</>
encryption scheme
private key
encryption key
databases
third party
data access
authentication protocol
secure communication