Login / Signup
Vorzüge und Grenzen des RSA-Verfahrens.
Frank Bourseau
Dirk Fox
Christoph Thiel
Published in:
Datenschutz und Datensicherheit (2002)
Keyphrases
</>
public key
signature scheme
key exchange
elliptic curve
modular exponentiation
public key cryptography
artificial intelligence
computer vision
image segmentation
multiscale
digital images
digital signature
private key
elliptic curve cryptography