Login / Signup
On the design and security of Lee metric McEliece cryptosystems.
Terry Shue Chien Lau
Chik How Tan
Published in:
Des. Codes Cryptogr. (2022)
Keyphrases
</>
information security
functional requirements
case study
security issues
neural network
design process
elliptic curve
low cost
intrusion detection
security policies