Login / Signup
Security under Key-Dependent Inputs.
Shai Halevi
Hugo Krawczyk
Published in:
IACR Cryptol. ePrint Arch. (2007)
Keyphrases
</>
high security
security policies
security requirements
private key
real time
data sets
intrusion detection
security management
information assurance
neural network
information security
key management
cryptographic protocols
block cipher
secure communication