Login / Signup

Security Analysis of Group Action Inverse Problem with Auxiliary Inputs with Application to CSIDH Parameters.

Taechan Kim
Published in: ICISC (2019)
Keyphrases
  • security analysis
  • security requirements
  • public key
  • data sources
  • network security
  • encryption scheme
  • user authentication