Login / Signup

Power of a public random permutation and its application to authenticated encryption.

Kaoru Kurosawa
Published in: IEEE Trans. Inf. Theory (2010)
Keyphrases
  • key exchange
  • random number
  • power consumption
  • authentication scheme
  • encryption algorithms
  • security analysis
  • digital signature
  • public space
  • neural network
  • information technology
  • image encryption