Login / Signup
Forgery attacks on the ID-based multisignature scheme without reblocking and predetermined signing order.
Kyung-Ah Shim
Published in:
Comput. Stand. Interfaces (2008)
Keyphrases
</>
signature scheme
chosen message
digital images
wavelet transform
countermeasures
sign language