Introduction to cryptography. Principles and applications.
From MaRDI portal
Cited in
(7)- Foundations of Cryptography
- Provably convertible multi-authenticated encryption scheme for generalized group communications
- Certifying assembly with formal security proofs: the case of BBS
- Generalized Walsh bases and applications
- A new look at the classical key exchange system based on amplified Johnson noise
- Security risk during the transient in a key exchange protocol using random signals and feedback
- Biometric identification on the cloud: a more secure and faster construction
This page was built for publication: Introduction to cryptography. Principles and applications.
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q869951)