Topological Authentication Technique In Topologically Asymmetric Cryptosystem.
Bing YaoJing SuFei MaHongyu WangChao YangPublished in: CoRR (2022)
Keyphrases
- symmetric key
- security analysis
- private key
- topology preserving
- key distribution
- key management
- cellular automata
- public key
- topological properties
- elliptic curve
- topology preservation
- user authentication
- image encryption
- authentication scheme
- d objects
- public key cryptography
- self organizing maps
- topological spaces
- chaotic maps
- biometric authentication
- authentication protocol
- power analysis