Security of 2 t -Root Identi£cation and Signatures (1996)

by C P SCHNORR
Venue:Advances in Cryptology – CRYPTO ’96, Lecture Notes in Computer Science