• search
    search
  • reviewers
    reviewers
  • feeds
    feeds
  • assignments
    assignments
  • settings
  • logout

Power of a public random permutation and its application to authenticated encryption.

Kaoru Kurosawa
Published in: IEEE Trans. Inf. Theory (2010)
Keyphrases
  • key exchange
  • random number
  • power consumption
  • authentication scheme
  • encryption algorithms
  • security analysis
  • digital signature
  • public space
  • neural network
  • information technology
  • image encryption