Login / Signup

Secure Messaging Application Development: Based on Post-Quantum Algorithms CSIDH, Falcon, and AES Symmetric Key Cryptosystem.

Nhu-Quynh LucTat-Thang NguyenChi-Hung VuDuc-Huy QuachThanh-Toan Dao
Published in: Program. Comput. Softw. (2024)
Keyphrases
  • application development
  • symmetric key
  • security analysis
  • web applications
  • data processing
  • security protocols
  • databases
  • end users
  • key management
  • key distribution
  • database
  • user interface
  • fault tolerant
  • standard model