Security of the GPT cryptosystem and its applications to cryptography.
Haitham RashwanErnst M. GabidulinBahram HonaryPublished in: Secur. Commun. Networks (2011)
Keyphrases
- symmetric key
- cellular automata
- security analysis
- public key cryptosystem
- information security
- security protocols
- security requirements
- elliptic curve
- elliptic curve cryptography
- security mechanisms
- encryption algorithms
- encryption algorithm
- public key
- diffie hellman
- public key cryptography
- key management
- private key
- cryptographic algorithms
- security issues
- encryption scheme
- security model
- security properties
- secret key
- smart card
- intrusion detection
- image encryption
- high security
- information systems
- security level
- key distribution
- data protection
- security threats
- statistical databases
- scalar multiplication
- access control