Login / Signup
Perturbed Hidden Matrix Cryptosystems.
Zhiping Wu
Jintai Ding
Jason E. Gower
Dingfeng Ye
Published in:
ICCSA (2) (2005)
Keyphrases
</>
singular values
singular value decomposition
low rank
secret information
elliptic curve
image processing
original data
real time
data sets
feature selection
image sequences
linear combination
secret key
cryptographic protocols