Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Simple Matrix Scheme for Encryption

    There are several attempts to build asymmetric pubic key encryption schemes based on multivariate polynomials of degree two over a finite field. However, most of them are insecure. The common defect in many of...

    Chengdong Tao, Adama Diene, Shaohua Tang, **tai Ding in Post-Quantum Cryptography (2013)