On the security of generalized Jacobian cryptosystems.
Isabelle DéchènePublished in: Adv. Math. Commun. (2007)
Keyphrases
- fuzzy vault
- elliptic curve
- cryptographic protocols
- information security
- private key
- intrusion detection
- access control
- security policies
- security level
- secret key
- key management
- smart card
- security problems
- key distribution
- network security
- least squares
- vector field
- security analysis
- singular value decomposition
- authentication protocol
- security systems
- public key
- security requirements
- security issues
- elliptic curve cryptography
- statistical databases
- security mechanisms
- anomaly detection
- countermeasures
- security threats
- security services
- information assurance