Skip to main navigation Skip to search Skip to main content

Threshold MACs

Research output: Chapter in Book/Report/Conference proceedingChapter

Original languageEnglish
Title of host publicationInformation Security and Cryptology - ICISC 2002
PublisherSpringer
Pages237-252
Number of pages16
Volume2587
DOIs
Publication statusPublished - 2003

Publication series

NameLecture Notes in Computer Science

Cite this