Publisher
Springer International Publishing
Reference9 articles.
1. Lecture Notes in Computer Science;M Bellare,1994
2. Mironov, I., Pandey, O., Reingold, O., Segev, G.: Incremental Deterministic public-key encryption. J. Cryptol. 31(1), 134–161 (2017). https://doi.org/10.1007/s00145-017-9252-1
3. Acharya, B., Panigrahy, S.K., Patra, S., Panda, G.: Image encryption using advanced hill cipher algorithm. Int. J. Recent Trends Eng. 1, 663–667 (2009)
4. Bellare, M., Goldreich, O., Goldwasser, S.: Incremental cryptography and application to virus protection. In: STOC, pp. 45–56 (1995)
5. Yerushalmi, Y.: Incremental cryptography (2008)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Review of Cyber Security in Cryptography: Services, Attacks, and Key Approach;2023 Third International Conference on Artificial Intelligence and Smart Energy (ICAIS);2023-02-02