Login / Signup
Security Bounds for the Design of Code-based Cryptosystems.
Matthieu Finiasz
Nicolas Sendrier
Published in:
IACR Cryptol. ePrint Arch. (2009)
Keyphrases
</>
functional requirements
lower bound
design process
case study
elliptic curve
access control
network security
security policies
upper and lower bounds
fully functional