Login / Signup
From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security.
Michel Abdalla
Jee Hea An
Mihir Bellare
Chanathip Namprempre
Published in:
EUROCRYPT (2002)
Keyphrases
</>
information security
access control
security issues
security policies
security requirements
network security
security threats
neural network
intrusion detection
signature recognition
functional requirements
computer security
security protocols
security systems
security measures
information assurance