Title | ||
---|---|---|
How to implement the public Key Operations in Code-based Cryptography on Memory-constrained Devices. |
Year | Venue | Field |
---|---|---|
2010 | IACR Cryptology ePrint Archive | Public key infrastructure,Key distribution,Control theory,PKCS #1,Cryptography,Computer science,Computer security,Smart card,Public-key cryptography,Computation |
DocType | Volume | Citations |
Journal | 2010 | 1 |
PageRank | References | Authors |
0.37 | 9 | 1 |
Name | Order | Citations | PageRank |
---|---|---|---|
Falko Strenzke | 1 | 98 | 7.01 |