On the security of a practical identification scheme
From MaRDI portal
Recommendations
Cited in
(16)- The power of identification schemes
- On the Security of Beth’s Identification Schemes against Active and Concurrent Adversaries
- scientific article; zbMATH DE number 493095 (Why is no real title available?)
- scientific article; zbMATH DE number 708813 (Why is no real title available?)
- Some remarks on the security of the identification scheme based on permuted kernels
- scientific article; zbMATH DE number 177023 (Why is no real title available?)
- On the security of a practical identification scheme
- The Challenges Raised by the Privacy-Preserving Identity Card
- Security of \(2^t\)-root identification and signatures
- Security proofs for identity-based identification and signature schemes
- scientific article; zbMATH DE number 1406778 (Why is no real title available?)
- scientific article; zbMATH DE number 2080700 (Why is no real title available?)
- Lattice-Based Identification Schemes Secure Under Active Attacks
- Human Identification Through Insecure Channel
- scientific article; zbMATH DE number 1942419 (Why is no real title available?)
- On the security of efficient user identification scheme
This page was built for publication: On the security of a practical identification scheme
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1819122)