• search
    search
  • reviewers
    reviewers
  • feeds
    feeds
  • assignments
    assignments
  • settings
  • logout

Postquantum Cryptography, Part 2.

Johannes BuchmannKristin E. LauterMichele Mosca
Published in: IEEE Secur. Priv. (2018)
Keyphrases
  • cellular automata
  • information security
  • data sets
  • real world
  • cryptographic algorithms
  • machine learning
  • data analysis
  • multiresolution
  • security protocols