Sign in

Encryption Schemes Secure under Related-Key and Key-Dependent Message Attacks.

Florian BöhlGareth T. DaviesDennis Hofheinz
Published in: Public Key Cryptography (2014)
Keyphrases
  • encryption scheme
  • private key
  • encryption key
  • databases
  • third party
  • data access
  • authentication protocol
  • secure communication