Login / Signup

New methods of construction of cartesian authentication codes from geometries over finite commutative rings.

Wachirapong JirakitpuwapatParin ChaipunyaPoom KumamSompong DhompongsaPhatiphat Thounthong
Published in: J. Math. Cryptol. (2018)
Keyphrases
  • information systems
  • benchmark datasets
  • machine learning algorithms
  • neural network
  • empirical studies
  • security analysis