Introduction to security reduction
From MaRDI portal
Publication:3174853
Recommendations
Cited in
(5)- A new post-quantum multivariate polynomial public key encapsulation algorithm
- Privacy and integrity properties of ECIES scheme
- Format-preserving encryption: a survey
- Efficient identity-based multi-copy data sharing auditing scheme with decentralized trust management
- An injectivity analysis of Crystals-Kyber and implications on quantum security
This page was built for publication: Introduction to security reduction
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3174853)