Continuous leakage-resilient certificate-based encryption
2016
Encryption schemes are generally considered to be secure in an ideal environment, where the adversary cannot obtain the secret internal state of schemes. However, in the realistic environment, the ...
Keywords:
- Correction
- Source
- Cite
- Save
- Machine Reading By IdeaReader
0
References
0
Citations
NaN
KQI