Login / Signup
How to Construct Polar Codes for Ring-LWE-Based Public Key Encryption.
Jiabo Wang
Cong Ling
Published in:
Entropy (2021)
Keyphrases
</>
public key encryption
public key
proxy re encryption
information retrieval
information systems
cost effective
error correction