An overview of cryptographic primitives for possible use in 5G and beyond.
Jing YangThomas JohanssonPublished in: Sci. China Inf. Sci. (2020)
Keyphrases
- smart card
- high level
- database
- low level
- real time
- detailed discussion
- cryptographic protocols
- knowledge base
- case study
- hash functions
- encryption scheme
- key management
- encryption key
- random number generator
- future trends
- security protocols
- building blocks
- feature selection
- learning algorithm
- genetic algorithm
- neural network