Login / Signup

On Some Weaknesses in the Disk Encryption Schemes EME and EME2.

Cuauhtemoc Mancillas-LópezDebrup ChakrabortyFrancisco Rodríguez-Henríquez
Published in: ICISS (2009)
Keyphrases
  • encryption scheme
  • public key
  • standard model
  • security analysis
  • public key encryption
  • security model
  • encryption key
  • cca secure
  • multiscale
  • hash functions
  • external memory