Login / Signup
Insecurity of MuSig and BN Multi-Signatures with Delayed Message Selection.
Sela Navot
Published in:
IACR Cryptol. ePrint Arch. (2024)
Keyphrases
</>
bayesian networks
designated verifier
email
data sets
information retrieval
signature scheme
selection criteria
information systems
knowledge base
data structure
signature recognition