Login / Signup
Security analysis of the Classic McEliece, HQC and BIKE schemes in low memory.
Yu Li
Li-Ping Wang
Published in:
J. Inf. Secur. Appl. (2023)
Keyphrases
</>
security analysis
low memory
data cube
smart card
security requirements
public key
security properties
encryption scheme
memory requirements
mutual authentication
transform coding
data warehouse
multi dimensional
authentication protocol
information security
authentication scheme
information systems
database