A Summary of McEliece-Type Cryptosystems and their Security.
Daniela EngelbertRaphael OverbeckArthur SchmidtPublished in: J. Math. Cryptol. (2007)
Keyphrases
- elliptic curve
- cryptographic protocols
- fuzzy vault
- access control
- intrusion detection
- security issues
- information security
- private key
- information assurance
- security requirements
- public key
- security problems
- security systems
- cyber security
- statistical databases
- database systems
- data integrity
- database
- network security
- smart card
- security threats
- neural network