Cryptography
DOI10.1201/9780429354649-2zbMATH Open1493.94038OpenAlexW4205974193MaRDI QIDQ5079652FDOQ5079652
Authors: Gretchen L. Matthews, Aidan W. Murphy
Publication date: 27 May 2022
Published in: Mathematics in Cyber Research (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1201/9780429354649-2
Recommendations
Goppa codesReed-Solomon codescode-based cryptographyLDPC codesMDPC codeslow- and moderate-density parity-check codesMcEliece cryptosystemsNiederreiter cryptosystemsself-contained overview
Research exposition (monographs, survey articles) pertaining to information and communication theory (94-02) Cryptography (94A60) Linear codes (general theory) (94B05)
Cited In (13)
- Ring theory
- Title not available (Why is that?)
- Title not available (Why is that?)
- 16 RSA security implementation in quantum computing for a higher resilience
- CS-Cipher
- Title not available (Why is that?)
- 15 Post-quantum cryptography for the detection of injection attacks in small-scale networks
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
This page was built for publication: Cryptography
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5079652)