Login / Signup
Key Reuse Attacks on Post-quantum Cryptosystems, Revisited.
Ke Wang
Zhenfeng Zhang
Haodong Jiang
Huiqin Xie
Yanjun Li
Ying Sun
Lidong Han
Published in:
Comput. J. (2024)
Keyphrases
</>
cryptographic protocols
countermeasures
malicious attacks
lightweight
signature scheme
standard model
elliptic curve
high security