FeigeFiatShamir identification scheme
Results: 3
# | Item |
---|---|
1![]() | Reset Secure Identity-Based Identification Schemes without Pairing Ji-Jian Chin, Hiroaki Anada Syh-Yuan Tan Direction and Motivations Cryptography: the art and science of concealingAdd to Reading ListSource URL: security-lab.jaist.ac.jpLanguage: English - Date: 2015-11-23 04:37:54 |
2![]() | ETH Zurich, Department of Computer Science FS 2015 Prof. Dr. Ueli Maurer Dr. Martin Hirt Sandro CorettiAdd to Reading ListSource URL: www.crypto.ethz.chLanguage: English - Date: 2015-02-25 05:09:48 |
3![]() | ETH Zurich, Department of Computer Science FS 2015 Prof. Dr. Ueli Maurer Dr. Martin Hirt Sandro CorettiAdd to Reading ListSource URL: www.crypto.ethz.chLanguage: English - Date: 2015-02-25 05:09:48 |