Sign in

Practical Threshold Signatures Without Random Oracles.

Jin LiTsz Hon YuenKwangjo Kim
Published in: ProvSec (2007)
Keyphrases
  • signature scheme
  • real world
  • information systems
  • signature verification
  • neural network
  • genetic algorithm
  • practical application