Login / Signup
Quantum security analysis of Wave.
Johanna Loyer
Published in:
IACR Cryptol. ePrint Arch. (2023)
Keyphrases
</>
security analysis
security requirements
public key
smart card
high security
security model
authentication protocol
security properties
image encryption
encryption scheme
user authentication
databases
encryption algorithm
private key
mutual authentication
authentication scheme