Login / Signup

Postquantum Cryptography, Part 2.

Johannes BuchmannKristin E. LauterMichele Mosca
Published in: IEEE Secur. Priv. (2018)
Keyphrases
  • cellular automata
  • information security
  • data sets
  • real world
  • cryptographic algorithms
  • machine learning
  • data analysis
  • multiresolution
  • security protocols