When are identification protocols with sparse challenges...

When are identification protocols with sparse challenges safe? The case of the Coskun and Herley attack

Asghar, Hassan Jameel, Kaafar, Mohamed Ali
How much do you like this book?
What’s the quality of the file?
Download the book for quality assessment
What’s the quality of the downloaded files?
Volume:
11
Language:
english
Journal:
Journal of Mathematical Cryptology
DOI:
10.1515/jmc-2015-0059
File:
PDF, 1.87 MB
english
Conversion to is in progress
Conversion to is failed