Sign in

Adaptive Witness Encryption and Asymmetric Password-Based Cryptography.

Mihir BellareViet Tung Hoang
Published in: Public Key Cryptography (2015)
Keyphrases
  • key exchange
  • encryption algorithms
  • security analysis
  • public key cryptography
  • elliptic curve cryptography
  • cryptographic protocols
  • digital signature
  • cryptographic algorithms