Login / Signup
Considerations for rank-based cryptosystems.
Anna-Lena Horlemann-Trautmann
Kyle Marshall
Joachim Rosenthal
Published in:
ISIT (2016)
Keyphrases
</>
elliptic curve
cryptographic protocols
artificial intelligence
trade off
signature scheme
secret key
database
knowledge base
digital libraries
smart card
fuzzy vault
databases
information systems
multiresolution
control system