A COMPARATIVE STUDY ON TWO SIGNATURE SCHEMES BASED ON ISOGENIES AND QUATERNIONS
Society needs digital signature schemes to ensure information security and digital authentication in this digital era. Currently, there are some widely used digital signatures. However, these digital signatures are prone to attacks by quantum computers, which can execute Shor’s algorithm. This at...
Saved in:
Main Author: | Syafithri, Nurul |
---|---|
Format: | Final Project |
Language: | Indonesia |
Online Access: | https://digilib.itb.ac.id/gdl/view/67128 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Institut Teknologi Bandung |
Language: | Indonesia |
Similar Items
-
POST-QUANTUM KEY-EXCHANGE USING SUPERSINGULAR ISOGENY
by: ISHLAHUL HANIF (NIM: 10114042), MUHAMMAD -
THE QUATERNIONS
by: SEE JONAH
Published: (2021) -
Strongly secure authenticated key exchange from supersingular isogenies
by: XU, Xiu, et al.
Published: (2019) -
Quaternionic determinants
by: Aslaksen, H.
Published: (2014) -
Moduli of Quaternionic Superminimal Immersions of 2-Spheres into Quaternionic Projective Spaces
by: Kobak, P.Z., et al.
Published: (2014)