Login / Signup
Schnorr-Like Identification Scheme Resistant to Malicious Subliminal Setting of Ephemeral Secret.
Lukasz Krzywiecki
Published in:
SECITC (2016)
Keyphrases
</>
wavelet transform
multiresolution
secret sharing scheme
visual cryptography
secret sharing
detection scheme
smart card
key management
recognition scheme
secret data