Some Cryptographic Applications of Permutation Polynomials.
Jack LevineJoel V. BrawleyPublished in: Cryptologia (1977)
Keyphrases
- smart card
- key management
- encryption key
- hash functions
- database
- low order
- doubly stochastic
- information retrieval
- algebraic geometry
- security properties
- security requirements
- random number generator
- secure communication
- digital signature
- distributed systems
- d objects
- wireless sensor networks
- information systems
- learning algorithm
- real time