Login / Signup
An authentication scheme based on roots of sparse polynomials.
Joachim von zur Gathen
Amin Shokrollahi
Igor E. Shparlinski
Published in:
ITW (2003)
Keyphrases
</>
authentication scheme
smart card
user authentication
image encryption
secret key
public key
security analysis
authentication protocol
security flaws
high dimensional
image authentication
key management
feature extraction
sparse representation