Login / Signup
Authenticated Encryption for Very Short Inputs.
Alexandre Adomnicai
Kazuhiko Minematsu
Junji Shikata
Published in:
IACR Cryptol. ePrint Arch. (2023)
Keyphrases
</>
key exchange
security analysis
neural network
digital libraries
key management
authentication scheme
artificial neural networks
input data
input variables
secret key
encryption scheme
security properties
key agreement protocol
key exchange protocol