Design and Security Analysis of Cryptosystems
The development of cryptography is closely related to the development of computers [...]
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2023-01-01
|
Series: | Applied Sciences |
Subjects: | |
Online Access: | https://www.mdpi.com/2076-3417/13/3/1427 |
_version_ | 1827760565356855296 |
---|---|
author | Suhri Kim Seokhie Hong |
author_facet | Suhri Kim Seokhie Hong |
author_sort | Suhri Kim |
collection | DOAJ |
description | The development of cryptography is closely related to the development of computers [...] |
first_indexed | 2024-03-11T09:53:15Z |
format | Article |
id | doaj.art-b33bf8dcfc8c425aa106aa6963ce14e4 |
institution | Directory Open Access Journal |
issn | 2076-3417 |
language | English |
last_indexed | 2024-03-11T09:53:15Z |
publishDate | 2023-01-01 |
publisher | MDPI AG |
record_format | Article |
series | Applied Sciences |
spelling | doaj.art-b33bf8dcfc8c425aa106aa6963ce14e42023-11-16T16:05:18ZengMDPI AGApplied Sciences2076-34172023-01-01133142710.3390/app13031427Design and Security Analysis of CryptosystemsSuhri Kim0Seokhie Hong1School of Mathematics, Statistics and Data Sciences Sungshin Women’s University, Seoul 02844, Republic of KoreaCenter for Information Security Technologies, Institute of Cyber Security and Privacy, Korea University, Seoul 02841, Republic of KoreaThe development of cryptography is closely related to the development of computers [...]https://www.mdpi.com/2076-3417/13/3/1427n/a |
spellingShingle | Suhri Kim Seokhie Hong Design and Security Analysis of Cryptosystems Applied Sciences n/a |
title | Design and Security Analysis of Cryptosystems |
title_full | Design and Security Analysis of Cryptosystems |
title_fullStr | Design and Security Analysis of Cryptosystems |
title_full_unstemmed | Design and Security Analysis of Cryptosystems |
title_short | Design and Security Analysis of Cryptosystems |
title_sort | design and security analysis of cryptosystems |
topic | n/a |
url | https://www.mdpi.com/2076-3417/13/3/1427 |
work_keys_str_mv | AT suhrikim designandsecurityanalysisofcryptosystems AT seokhiehong designandsecurityanalysisofcryptosystems |