Login / Signup
A note on lower bounds for non-interactive message authentication using weak keys.
Divesh Aggarwal
Alexander Golovnev
Published in:
ITW Fall (2015)
Keyphrases
</>
lower bound
upper bound
email
user interaction
branch and bound
objective function
authentication scheme
np hard
lower and upper bounds
virtual reality
short message service
branch and bound algorithm
optimal solution
communication channels
image registration
user authentication
relational databases