Return to Article Details Basic statements on the security model for asymmetric transformations of the ES type taking into account the requirements and threats of the post-quantum period Download Download PDF