Login / Signup
Weakness in Some Threshold Cryptosystems.
Susan K. Langford
Published in:
CRYPTO (1996)
Keyphrases
</>
threshold selection
real world
information retrieval
artificial intelligence
secret key
adaptive threshold
thresholding algorithm
database
real time
databases
genetic algorithm
elliptic curve
thresholding method
cryptographic protocols