Cryptanalysis of an authentication scheme using truncated polynomials
10.1016/j.ipl.2009.04.011
Saved in:
Main Authors: | Grassl, M., Steinwandt, R. |
---|---|
Other Authors: | CENTRE FOR QUANTUM TECHNOLOGIES |
Format: | Article |
Published: |
2014
|
Subjects: | |
Online Access: | http://scholarbank.nus.edu.sg/handle/10635/115659 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | National University of Singapore |
Similar Items
-
Cryptanalysis of Polynomial Authentication and Signature Scheme
by: WU, Hongjun, et al.
Published: (2000) -
Cryptanalysis of the Tillich-Zémor hash function
by: Grassl, M., et al.
Published: (2014) -
Authentication schemes from highly nonlinear functions
by: Carlet, C., et al.
Published: (2014) -
Polynomial reproduction by symmetric subdivision schemes
by: Dyn, N., et al.
Published: (2014) -
Two Robust Remote User Authentication Protocols Using Smart Cards
by: YEH, Kuo-Hui, et al.
Published: (2010)