A Summary of McEliece-Type Cryptosystems and their Security.
Daniela EngelbertRaphael OverbeckArthur SchmidtPublished in: IACR Cryptol. ePrint Arch. (2006)
Keyphrases
- elliptic curve
- fuzzy vault
- cryptographic protocols
- information security
- intrusion detection
- network security
- security issues
- access control
- security policies
- private key
- database
- secret key
- computer security
- standard model
- key distribution
- security level
- smart card
- authentication scheme
- security problems
- security management