Design and Security Analysis of Cryptosystems

The development of cryptography is closely related to the development of computers [...]

Bibliographic Details
Main Authors: Suhri Kim, Seokhie Hong
Format: Article
Language:English
Published: MDPI AG 2023-01-01
Series:Applied Sciences
Subjects:
n/a
Online Access:https://www.mdpi.com/2076-3417/13/3/1427
_version_ 1827760565356855296
author Suhri Kim
Seokhie Hong
author_facet Suhri Kim
Seokhie Hong
author_sort Suhri Kim
collection DOAJ
description The development of cryptography is closely related to the development of computers [...]
first_indexed 2024-03-11T09:53:15Z
format Article
id doaj.art-b33bf8dcfc8c425aa106aa6963ce14e4
institution Directory Open Access Journal
issn 2076-3417
language English
last_indexed 2024-03-11T09:53:15Z
publishDate 2023-01-01
publisher MDPI AG
record_format Article
series Applied Sciences
spelling doaj.art-b33bf8dcfc8c425aa106aa6963ce14e42023-11-16T16:05:18ZengMDPI AGApplied Sciences2076-34172023-01-01133142710.3390/app13031427Design and Security Analysis of CryptosystemsSuhri Kim0Seokhie Hong1School of Mathematics, Statistics and Data Sciences Sungshin Women’s University, Seoul 02844, Republic of KoreaCenter for Information Security Technologies, Institute of Cyber Security and Privacy, Korea University, Seoul 02841, Republic of KoreaThe development of cryptography is closely related to the development of computers [...]https://www.mdpi.com/2076-3417/13/3/1427n/a
spellingShingle Suhri Kim
Seokhie Hong
Design and Security Analysis of Cryptosystems
Applied Sciences
n/a
title Design and Security Analysis of Cryptosystems
title_full Design and Security Analysis of Cryptosystems
title_fullStr Design and Security Analysis of Cryptosystems
title_full_unstemmed Design and Security Analysis of Cryptosystems
title_short Design and Security Analysis of Cryptosystems
title_sort design and security analysis of cryptosystems
topic n/a
url https://www.mdpi.com/2076-3417/13/3/1427
work_keys_str_mv AT suhrikim designandsecurityanalysisofcryptosystems
AT seokhiehong designandsecurityanalysisofcryptosystems