Login / Signup
Restricted linear congruences and an authenticated encryption scheme.
Khodakhast Bibak
Bruce M. Kapron
Srinivasan Venkatesh
Roberto Tauraso
László Tóth
Published in:
CoRR (2015)
Keyphrases
</>
encryption scheme
key exchange
public key
standard model
authentication scheme
secret key
diffie hellman
security analysis
ciphertext
data sharing
security model
databases
lossless compression
hash functions
data model
high dimensional
data streams
multiscale
database
encryption key
public key cryptosystem
cca secure