Login / Signup

How to Construct Polar Codes for Ring-LWE-Based Public Key Encryption.

Jiabo WangCong Ling
Published in: Entropy (2021)
Keyphrases
  • public key encryption
  • public key
  • proxy re encryption
  • information retrieval
  • information systems
  • cost effective
  • error correction