Login / Signup

An efficient identification protocol secure against concurrent-reset attacks.

Jiang WuDouglas R. Stinson
Published in: J. Math. Cryptol. (2009)
Keyphrases