Report - Some Applications of Coding Theory in Cryptography · weakness is found in another such scheme, proposed by Alabbadi and Wicker, which leads to an attacker being able to forge signatures

Please pass captcha verification before submit form