Login / Signup
Attacking a polynomial-based cryptosystem: Polly Cracker.
Rainer Steinwandt
Willi Geiselmann
Regine Endsuleit
Published in:
Int. J. Inf. Sec. (2002)
Keyphrases
</>
cellular automata
public key cryptosystem
elliptic curve
information systems
database
multi agent
image encryption
power analysis
low degree
polynomial hierarchy
algebraic geometry