Login / Signup
Spooky Encryption and Its Applications.
Yevgeniy Dodis
Shai Halevi
Ron D. Rothblum
Daniel Wichs
Published in:
CRYPTO (3) (2016)
Keyphrases
</>
encryption algorithms
image encryption
multimedia streaming
encryption scheme
identity authentication
data encryption
databases
chaotic sequence
multiscale
information hiding
encryption algorithm
security properties
database systems
key exchange
data confidentiality
elliptic curve cryptography
database