Login / Signup
Security Analysis and Key Modification for ZHFE.
Ray A. Perlner
Daniel Smith-Tone
Published in:
PQCrypto (2016)
Keyphrases
</>
security analysis
high security
private key
public key
smart card
security properties
security requirements
image encryption
security model
encryption scheme
authentication protocol
authentication scheme
information systems
proxy signature scheme
user authentication
distributed systems
database systems