Login / Signup

Cryptographic Algorithm Implementation Requirements and Usage Guidance for Encapsulating Security Payload (ESP) and Authentication Header (AH).

Paul WoutersDaniel MigaultJohn MattssonYoav NirTero Kivinen
Published in: RFC (2017)
Keyphrases
  • np hard
  • detection algorithm
  • computational complexity
  • k means
  • hardware implementation
  • objective function
  • optimal solution
  • dynamic programming
  • network security