On the Security of Girault's Identification Scheme.
Shahrokh SaeedniaReihaneh Safavi-NainiPublished in: Public Key Cryptography (1998)
Keyphrases
- digital signature scheme
- security analysis
- protection scheme
- security model
- electronic voting
- access control
- chosen plaintext
- authentication mechanism
- key exchange
- high security
- secure communication
- information systems
- smart card
- security mechanisms
- authentication protocol
- information security
- security issues
- security requirements
- security threats
- authentication scheme
- computer security
- key agreement protocol
- signcryption scheme
- security policies
- key management scheme
- wireless local area network
- network security
- secret sharing
- identity based cryptography
- public key encryption
- elliptic curve