Return to Article Details Threat models for asymmetric cryptotransformations of the promising electronic signature Download Download PDF