Key Substitution Attacks on Some Provably Secure Signature Schemes

Chik-How Tan. Key Substitution Attacks on Some Provably Secure Signature Schemes. IEICE Transactions, 87-A(1):226-227, 2004. [doi]

Authors

Chik-How Tan

This author has not been identified. Look up 'Chik-How Tan' in Google