37
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: not found
      • Book Chapter: not found
      Frontiers of Combining Systems 

      Asymmetric Subversion Attacks on Signature Schemes

      other
      , , ,
      Springer International Publishing

      Read this book at

      Buy book Bookmark
          There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.

          Related collections

          Most cited references23

          • Record: found
          • Abstract: not found
          • Article: not found

          A public key cryptosystem and a signature scheme based on discrete logarithms

          T. Elgamal (1985)
            Bookmark
            • Record: found
            • Abstract: not found
            • Book Chapter: not found

            Efficient Identity-Based Encryption Without Random Oracles

              Bookmark
              • Record: found
              • Abstract: not found
              • Book: not found

              Handbook of Applied Cryptography

                Bookmark

                Author and book information

                Book Chapter
                2018
                June 13 2018
                : 376-395
                10.1007/978-3-319-93638-3_22
                e5e5b35f-e93e-4e24-b805-e9a0146dbdd1
                History

                Comments

                Comment on this book

                Book chapters

                Similar content1,438

                Cited by2