On improving security of GPT cryptosystems.
Haitham RashwanBahram HonaryErnst M. GabidulinPublished in: ISIT (2009)
Keyphrases
- fuzzy vault
- cryptographic protocols
- elliptic curve
- private key
- information security
- intrusion detection
- security requirements
- security analysis
- secret key
- security systems
- security level
- access control
- elliptic curve cryptography
- public key
- security issues
- security model
- key management
- authentication protocol
- key distribution
- security policies
- security problems
- public key cryptosystems
- database
- information assurance
- biometric template
- database systems