Applications of Modulation in a McEliece-Like Symmetric-Key Scheme.
Wenyan LengLin SangChengxin XuXin ZhangPublished in: VTC Spring (2010)
Keyphrases
- symmetric key
- security analysis
- security requirements
- security protocols
- key management
- secure communication
- key establishment
- encryption algorithm
- encryption scheme
- security mechanisms
- public key
- security properties
- smart card
- diffie hellman
- secret key
- public key cryptography
- secret sharing scheme
- information security
- access control
- low cost