Login / Signup
Revisiting the security analysis of SNOVA.
Yasuhiko Ikematsu
Rika Akiyama
Published in:
IACR Cryptol. ePrint Arch. (2024)
Keyphrases
</>
security analysis
public key
smart card
high security
encryption scheme
security model
image encryption
security requirements
mutual authentication
security properties
authentication protocol
authentication scheme