Login / Signup
Fully Malicious Authenticated PIR.
Marian Dietz
Stefano Tessaro
Published in:
IACR Cryptol. ePrint Arch. (2023)
Keyphrases
</>
key exchange protocol
databases
malicious attacks
real time
data sets
artificial intelligence
case study
multiscale
authentication scheme
key exchange
private information retrieval