Login / Signup
Attacking the Niederreiter-type cryptosystem based on rank metric.
Chungen Xu
Yingying Zhang
Lin Mei
Lei Xu
Cong Zuo
Published in:
Int. J. Embed. Syst. (2020)
Keyphrases
</>
metric space
cellular automata
distance function
distance metric
real time
databases
real world
evaluation metrics