Cryptology ePrint Archive: Report 2010/624

Available versions in chronological order


No-leak authentication by the Sherlock Holmes method
Dima Grigoriev and Vladimir Shpilrain

No-leak authentication by the Sherlock Holmes method
Dima Grigoriev and Vladimir Shpilrain


[ Cryptology ePrint archive ]