Login / Signup
Secure List Decoding and its Application to Bit-String Commitment.
Masahito Hayashi
Published in:
IEEE Trans. Inf. Theory (2022)
Keyphrases
</>
bit string
case study
security analysis
decoding algorithm
security issues
security requirements
encryption scheme
cryptographic protocols
authentication scheme
group communication
security management
data sets
computational complexity
data encryption
scalar product