Login / Signup
Cryptanalysis of Riccati equation encryption schemes TP-I and TP-II.
Jian-Ming Shih
Lih-Chung Wang
Yossi Peretz
Published in:
Finite Fields Their Appl. (2018)
Keyphrases
</>
encryption scheme
secret key
hash functions
standard model
databases
differential equations
data model
low cost
public key
security analysis
homomorphic encryption