Abstract
In this paper we present a comment on some previous works about the Public Key Substitution Attacks (PKSA in brief). Though there exist some security flaws for the schemes being attacked, we point out that these attacks on them are either trivial or avoidable after a little modification.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have