Login / Signup
Adaptive Witness Encryption and Asymmetric Password-Based Cryptography.
Mihir Bellare
Viet Tung Hoang
Published in:
Public Key Cryptography (2015)
Keyphrases
</>
key exchange
encryption algorithms
security analysis
public key cryptography
elliptic curve cryptography
cryptographic protocols
digital signature
cryptographic algorithms