Provably secure one-way hash functions. A The remaining protocols with encryption The paper did not show the protocol where the verifier initiates the protocol, nor the one where both players prove their possession. Though hese protocols can be deduced re

mag(2008)

引用 23|浏览2
暂无评分
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要