Login / Signup

A note on lower bounds for non-interactive message authentication using weak keys.

Divesh AggarwalAlexander Golovnev
Published in: ITW Fall (2015)
Keyphrases