Threshold MACs

Keith M. Martin, J. Pieprzyk, R. Safavi-Naini, H. Wang, P.R. Wild

Research output: Chapter in Book/Report/Conference proceedingChapter

Original languageEnglish
Title of host publicationInformation Security and Cryptology - ICISC 2002
PublisherSpringer
Pages237-252
Number of pages16
Volume2587
DOIs
Publication statusPublished - 2003

Publication series

NameLecture Notes in Computer Science

Cite this