Login / Signup
Fully Deniable Interactive Encryption.
Ran Canetti
Sunoo Park
Oxana Poburinnaya
Published in:
CRYPTO (1) (2020)
Keyphrases
</>
authentication protocol
computer graphics
secret key
user interaction
real time
virtual reality
information systems
data analysis
smart card
security analysis
encryption algorithms
encryption decryption