Login / Signup
How to Prove the Security of Practical Cryptosystems with Merkle-Damgård Hashing by Adopting Indifferentiability.
Yusuke Naito
Kazuki Yoneyama
Lei Wang
Kazuo Ohta
Published in:
IACR Cryptol. ePrint Arch. (2009)
Keyphrases
</>
fuzzy vault
elliptic curve
cryptographic protocols
private key
real world
security issues
access control
computer security
security policies
intrusion detection
public key
random projections
information security
security requirements
security protocols
security properties
authentication scheme
order preserving