Authentication schemes from actions on graphs, groups, or rings

From MaRDI portal
Publication:638486