Login / Signup

Schnorr-Like Identification Scheme Resistant to Malicious Subliminal Setting of Ephemeral Secret.

Lukasz Krzywiecki
Published in: SECITC (2016)
Keyphrases
  • wavelet transform
  • multiresolution
  • secret sharing scheme
  • visual cryptography
  • secret sharing
  • detection scheme
  • smart card
  • key management
  • recognition scheme
  • secret data