Login / Signup
Two methods of directly constructing probabilistic public-key encryption primitives based on third-order LFSR sequences.
Zhengtao Jiang
Yang Zhan
Dan Chen
Yumin Wang
Published in:
Appl. Math. Comput. (2005)
Keyphrases
</>
information retrieval
low cost
image quality