Key Substitution Attacks on Some Provably Secure Signature Schemes

Chik-How Tan. Key Substitution Attacks on Some Provably Secure Signature Schemes. IEICE Transactions, 87-A(1):226-227, 2004. [doi]

References

No references recorded for this publication.

Cited by

No citations of this publication recorded.