Login / Signup
Cryptanalysis of an Authentication Scheme Using Truncated Polynomials.
Markus Grassl
Rainer Steinwandt
Published in:
IACR Cryptol. ePrint Arch. (2008)
Keyphrases
</>
authentication scheme
secret key
smart card
image encryption
public key
security flaws
image authentication
authentication protocol
user authentication
key management
hash functions
encryption scheme
signature scheme
security analysis
data mining
ciphertext
information security
response time
feature extraction