@alinta

AUTHENTICATION SCHEMES USING POLYNOMIALS OVER NON-COMMUTATIVE RINGS

. International Journal on Cryptography and Information Security (IJCIS), 2 (4): 51-58 (December 2012)

Links and resources

Tags