This paper describes a method for assuring that … A cheating party may claim that a pair … make the entire class of [signature authentication] attacks obsolete. … [p. 285] First we divide the n-bit long random … b-bit unique user-specific data. Then, we choose n-bit … [p. 286] What our method guarantees is that no … … In case there is an audit, the user …
Google-1
Google-2
Copyright clearance needed for quotation.