Sign in

Construction of algebraic complex 9-bit lookup tables using non-chain-ring and its applications in data security.

Muhammad Umair SafdarTariq ShahAsif AliTanveer ul Haq
Published in: Integr. (2024)
Keyphrases
  • data security
  • lookup tables
  • access control
  • data centric
  • lookup table
  • data integrity
  • input data
  • privacy preserving data mining