Login / Signup
Key Substitution Attacks on Lattice Signature Schemes Based on SIS Problem.
Youngjoo An
Hyang-Sook Lee
Juhee Lee
Seongan Lim
Published in:
Secur. Commun. Networks (2018)
Keyphrases
</>
signature scheme
standard model
countermeasures
private key
threshold signature scheme
digital signature scheme
public key
peer to peer
security policies
cryptographic protocols
chosen message
chosen ciphertext