Login / Signup

Two methods of directly constructing probabilistic public-key encryption primitives based on third-order LFSR sequences.

Zhengtao JiangYang ZhanDan ChenYumin Wang
Published in: Appl. Math. Comput. (2005)
Keyphrases
  • information retrieval
  • low cost
  • image quality