Cryptography and Exploitation of Chinese Manual Cryptosystems Part II: the Encrypting Problem.
David A. AugustPublished in: Cryptologia (1990)
Keyphrases
- secret key
- private key
- public key
- key distribution
- cryptographic protocols
- cellular automata
- public key cryptography
- elliptic curve
- image encryption
- semi automatic
- smart card
- encryption key
- authentication scheme
- error prone
- encryption scheme
- security analysis
- labor intensive
- information security
- word segmentation
- secure communication
- elliptic curve cryptography
- key management
- signature scheme
- text summarization
- foreign language
- chinese characters
- hash functions
- keyword extraction
- fault tolerant