Login / Signup
A Like ELGAMAL Cryptosystem But Resistant To Post-Quantum Attacks.
Ahmed El-Yahyaoui
Fouzia Omary
Published in:
Int. J. Commun. Networks Inf. Secur. (2022)
Keyphrases
</>
power analysis
countermeasures
cellular automata
quantum inspired
elliptic curve
quantum computing
watermarking scheme
traffic analysis
security risks
quantum computation
quantum mechanics
logic circuits
public key cryptosystem
computer security
scalar multiplication
chaotic maps