Login / Signup
Compliance Defects in Public Key Cryptography.
Don Davis
Published in:
USENIX Security Symposium (1996)
Keyphrases
</>
public key cryptography
public key
elliptic curve
public key infrastructure
authentication and key agreement
digital signature
provably secure
security model
elliptic curve cryptography
security services
security analysis
database
smart card
signature scheme
key management