Login / Signup
How to build time-lock encryption.
Jia Liu
Tibor Jager
Saqib A. Kakvi
Bogdan Warinschi
Published in:
Des. Codes Cryptogr. (2018)
Keyphrases
</>
encryption algorithms
concurrency control
data encryption
image encryption
data mining
case study
information hiding
encryption algorithm
database
ciphertext
high security
network communication
encryption decryption