IMPLEMENTATION EXAMPLE

  1. DIGITAL SIGNATURE
  2. AUTHENTICATION
  3. SECRET SHARING
  4. GROUP-ORIENTED CRYPTOGRAPHY
  5. IDENTIFICATION