Article,

Two methods of directly constructing probabilistic public-key encryption primitives based on third-order LFSR sequences.

, , , and .
Appl. Math. Comput., 171 (2): 900-911 (2005)

Meta data

Tags

Users

  • @dblp

Comments and Reviews