Login / Signup

Constructing Committing and Leakage-Resilient Authenticated Encryption.

Patrick StruckMaximiliane Weishäupl
Published in: IACR Trans. Symmetric Cryptol. (2024)
Keyphrases
  • key exchange
  • key exchange protocol
  • security analysis
  • image encryption
  • neural network
  • encryption algorithm
  • security properties
  • authentication scheme
  • diffie hellman