Login / Signup
GBD Threshold Cryptography with an Application to RSA Key Recovery.
Chris Steketee
Jaimee Brown
Juan Manuel González Nieto
Paul Montague
Published in:
ACISP (2005)
Keyphrases
</>
real time
private key
cellular automata
neural network
computer vision
case study
public key
threshold selection
public key cryptography
cryptographic algorithms
data sets
image segmentation
low cost
elliptic curve cryptography