Sign in

Key Substitution Attacks on Lattice Signature Schemes Based on SIS Problem.

Youngjoo AnHyang-Sook LeeJuhee LeeSeongan Lim
Published in: Secur. Commun. Networks (2018)
Keyphrases
  • signature scheme
  • standard model
  • countermeasures
  • private key
  • threshold signature scheme
  • digital signature scheme
  • public key
  • peer to peer
  • security policies
  • cryptographic protocols
  • chosen message
  • chosen ciphertext