Login / Signup
Cryptanalyses of two key assignment schemes based on polynomial interpolations.
Shyh-Yih Wang
Chi-Sung Laih
Published in:
Comput. Secur. (2005)
Keyphrases
</>
low order
metadata
case study
data structure
database
neural network
three dimensional
pairwise