Sign in

Key Reuse Attacks on Post-quantum Cryptosystems, Revisited.

Ke WangZhenfeng ZhangHaodong JiangHuiqin XieYanjun LiYing SunLidong Han
Published in: Comput. J. (2024)
Keyphrases
  • cryptographic protocols
  • countermeasures
  • malicious attacks
  • lightweight
  • signature scheme
  • standard model
  • elliptic curve
  • high security