Login / Signup
Revisiting the security analysis of SNOVA.
Yasuhiko Ikematsu
Rika Akiyama
Published in:
APKC@AsiaCCS (2024)
Keyphrases
</>
security analysis
smart card
security requirements
public key
security model
image encryption
security properties
high security
encryption scheme
mutual authentication
authentication protocol
user authentication
encryption algorithm
authentication scheme
high dimensional
security policies
access control
low cost