No-leak authentication by the Sherlock Holmes method
From MaRDI portal
Publication:2905583
DOI10.1515/GCC-2012-0009zbMath1272.94081OpenAlexW2022609500MaRDI QIDQ2905583
Vladimir Shpilrain, Dima Yu. Grigoriev
Publication date: 28 August 2012
Published in: Groups - Complexity - Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1515/gcc-2012-0009
Related Items (2)
This page was built for publication: No-leak authentication by the Sherlock Holmes method