@dblp

On the Security of Beth's Identification Schemes against Active and Concurrent Adversaries.

. MMICS, volume 5393 of Lecture Notes in Computer Science, page 1-17. Springer, (2008)

Links and resources

Tags