Login / Signup
On digital signatures based on isomorphism problems: QROM security and ring signatures.
Zhili Chen
Dung Hoang Duong
Tuong Ngoc Nguyen
Youming Qiao
Willy Susilo
Gang Tang
Published in:
IACR Cryptol. ePrint Arch. (2022)
Keyphrases
</>
digital signature
smart card
information security
signature scheme
security mechanisms
public key
data integrity
access control
security requirements
key management
security analysis
elliptic curve
trusted third party