Login / Signup

Cryptanalyses of two key assignment schemes based on polynomial interpolations.

Shyh-Yih WangChi-Sung Laih
Published in: Comput. Secur. (2005)
Keyphrases
  • low order
  • metadata
  • case study
  • data structure
  • database
  • neural network
  • three dimensional
  • pairwise