Public Key Cryptosystem

McEliece public key cryptosystems using algebraic-geometric codes

Information Theory / Pure Mathematics / Propulsion / Gaussian processes / Public key cryptography / Decoding / Linear Code / Galois Fields / Electrical And Electronic Engineering / Application Software / Public Key Cryptosystem / Decoding / Linear Code / Galois Fields / Electrical And Electronic Engineering / Application Software / Public Key Cryptosystem

A matricial public key cryptosystem with digital signature

Digital Signature / Finite Group Theory / Finite Field / Public Key Cryptosystem

A Public Key Cryptosystem Based on Block Upper Triangular Matrices

Digital Signature / Finite Group Theory / Finite Field / AA / Key Agreement / Key Exchange / Public Key Cryptosystem / Key Exchange / Public Key Cryptosystem

A Public Key Cryptosystem Based on Block Upper Triangular Matrices

Digital Signature / Finite Group Theory / Finite Field / AA / Key Agreement / Key Exchange / Public Key Cryptosystem / Key Exchange / Public Key Cryptosystem

Optimal-resilience proactive public-key cryptosystems

Computer Science / Secret Sharing / Public Key Cryptosystem

A Public Key Cryptosystem Based on Block Upper Triangular Matrices

Digital Signature / Finite Group Theory / Finite Field / AA / Key Agreement / Key Exchange / Public Key Cryptosystem / Key Exchange / Public Key Cryptosystem

A Public Key Cryptosystem Based on Block Upper Triangular Matrices

Digital Signature / Finite Group Theory / Finite Field / AA / Key Agreement / Key Exchange / Public Key Cryptosystem / Key Exchange / Public Key Cryptosystem

A Novel Processor Architecture for McEliece Cryptosystem and FPGA Platforms

Quantum Computing / FPGA / Field-Programmable Gate Arrays / Processor Architecture / Hardware / Public key cryptography / Decoding / High performance / Encoding / Embedded System / Public Key Cryptosystem / Public key cryptography / Decoding / High performance / Encoding / Embedded System / Public Key Cryptosystem

Improved Merkle Cryptosystem (IMC)

Computer Security / Cryptography / Encryption / Text / IT Security / Public key cryptography / Hashing / Utility Computing / Cryptographic Hash Function / Key Agreement / Key Establishment / Public Key Cryptosystem / Information System / Public key cryptography / Hashing / Utility Computing / Cryptographic Hash Function / Key Agreement / Key Establishment / Public Key Cryptosystem / Information System
Copyright © 2017 DADOSPDF Inc.