Post-Quantum Two-Party Adaptor Signature Based on Coding Theory.
Jean Belo KlamtiM. Anwar HasanPublished in: Cryptogr. (2022)
Keyphrases
- quantum computing
- quantum computation
- anomaly detection
- intrusion detection
- quantum inspired
- network traffic
- network intrusion detection
- document image retrieval
- multiscale
- logic circuits
- probability ranking principle
- real world
- evolutionary algorithm
- expert systems
- web services
- image processing
- information retrieval