Login / Signup
New methods of construction of cartesian authentication codes from geometries over finite commutative rings.
Wachirapong Jirakitpuwapat
Parin Chaipunya
Poom Kumam
Sompong Dhompongsa
Phatiphat Thounthong
Published in:
J. Math. Cryptol. (2018)
Keyphrases
</>
information systems
benchmark datasets
machine learning algorithms
neural network
empirical studies
security analysis