Login / Signup
Power of a public random permutation and its application to authenticated encryption.
Kaoru Kurosawa
Published in:
IEEE Trans. Inf. Theory (2010)
Keyphrases
</>
key exchange
random number
power consumption
authentication scheme
encryption algorithms
security analysis
digital signature
public space
neural network
information technology
image encryption