Login / Signup

Cryptanalysis of Riccati equation encryption schemes TP-I and TP-II.

Jian-Ming ShihLih-Chung WangYossi Peretz
Published in: Finite Fields Their Appl. (2018)
Keyphrases
  • encryption scheme
  • secret key
  • hash functions
  • standard model
  • databases
  • differential equations
  • data model
  • low cost
  • public key
  • security analysis
  • homomorphic encryption