Login / Signup
Security Analysis of Group Action Inverse Problem with Auxiliary Inputs with Application to CSIDH Parameters.
Taechan Kim
Published in:
ICISC (2019)
Keyphrases
</>
security analysis
security requirements
public key
data sources
network security
encryption scheme
user authentication