Login / Signup
On Applications of Singular Matrices over Finite Fields in Cryptography.
Dhirendra Singh Yadav
Rajendra Kumar Sharma
Wagish Shukla
Published in:
InfoSecHiComNet (2011)
Keyphrases
</>
cellular automata
singular value decomposition
dynamic programming
application fields
data sets
data mining
learning algorithm
artificial intelligence
computer vision
case study
information security
covariance matrices
data matrix
finite automata
kronecker product