Techniques are described for generating and validating signatures. In an
implementation, a method includes generating a signature by utilizing a
plurality of isogenies included on a private key and incorporating the
signature and a public key on a product, in which the public key is
configured to validate the signature.