Login / Signup
Secure Messaging Application Development: Based on Post-Quantum Algorithms CSIDH, Falcon, and AES Symmetric Key Cryptosystem.
Nhu-Quynh Luc
Tat-Thang Nguyen
Chi-Hung Vu
Duc-Huy Quach
Thanh-Toan Dao
Published in:
Program. Comput. Softw. (2024)
Keyphrases
</>
application development
symmetric key
security analysis
web applications
data processing
security protocols
databases
end users
key management
key distribution
database
user interface
fault tolerant
standard model