Login / Signup
The implementation of polynomial multiplication for lattice-based cryptography: A survey.
Chenkai Zeng
Debiao He
Qi Feng
Cong Peng
Min Luo
Published in:
J. Inf. Secur. Appl. (2024)
Keyphrases
</>
cellular automata
implementation issues
genetic algorithm
computer vision
image sequences
expert systems
evolutionary algorithm
information security
efficient implementation
low order