Login / Signup
Security Features of an Asymmetric Cryptosystem based on the Diophantine Equation Discrete Log Problem.
Muhammad Rezal Kamel Ariffin
M. A. Asbullah
Nor Azman Abu
Published in:
IACR Cryptol. ePrint Arch. (2011)
Keyphrases
</>
feature vectors
extracted features
public key cryptosystem
cellular automata
feature extraction
low level
feature set
scale space
access control
information security
security issues
security requirements
private key