Login / Signup

Analysis of a Public Key Approach Based on Polynomial Substitution.

Harriet J. FellWhitfield Diffie
Published in: CRYPTO (1985)
Keyphrases
  • public key
  • security analysis
  • similarity measure
  • privacy preserving
  • cost effective