Weakness in quaternion signatures
From MaRDI portal
Publication:5934140
DOI10.1007/s001450010006zbMath1023.94545OpenAlexW2040445917MaRDI QIDQ5934140
Publication date: 10 November 2003
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s001450010006
attacksdigital signature schemesnoncommutative ring of quaternionspolynomial signature schemesSatoh Araki scheme
Related Items
A security analysis of uniformly-layered Rainbow defined over non-commutative rings, Key exchange protocols over noncommutative rings. The case of, Signature scheme using the root extraction problem on quaternions