"Tesla Cryptography:" Powering Up Security with Other Than Mathematical Complexity.
Gideon SamidPublished in: IACR Cryptol. ePrint Arch. (2023)
Keyphrases
- information security
- cellular automata
- intrusion detection
- information assurance
- worst case
- security problems
- cryptographic algorithms
- security level
- security systems
- security requirements
- neural network
- network security
- decision problems
- access control
- elliptic curve cryptography
- security issues
- public key cryptography
- security management
- security threats
- computer security
- security policies
- space complexity
- computational complexity