Securing Communication 2FA Using Post-Quantic Cryptosystem: Case of QC-MDPC- Mceliece Cryptosystem.
Kouraogo YacoubaGhizlane OrhanouSaid ElhajjiPublished in: Int. J. Inf. Secur. Priv. (2020)
Keyphrases
- cellular automata
- elliptic curve
- chaotic maps
- public key cryptosystem
- encryption algorithm
- scalar multiplication
- power analysis
- computer networks
- information systems
- resource constrained
- image encryption scheme
- image encryption
- communication channels
- information exchange
- communication systems
- data acquisition
- database systems