Login / Signup
Misuse-resistant MGM2 mode.
Liliya R. Akhmetzyanova
Evgeny K. Alekseev
Alexandra Babueva
Andrey Bozhko
Stanislav Smyshlyaev
Published in:
IACR Cryptol. ePrint Arch. (2022)
Keyphrases
</>
real time
intrusion detection system
databases
artificial intelligence
computer vision
image processing
computational complexity
control system
data sets
multiscale
evolutionary algorithm
third party