Some Further Cryptographic Applications of Permutation Polynomials.
Jack LevineRichard ChandlerPublished in: Cryptologia (1987)
Keyphrases
- smart card
- hermite transform
- key management
- security protocols
- hash functions
- encryption scheme
- real time
- security properties
- security analysis
- doubly stochastic
- lagrange interpolation
- encryption key
- algebraic geometry
- cryptographic algorithms
- random number generator
- wireless sensor networks
- website
- social networks
- machine learning