Login / Signup
Superposition Attacks on Cryptographic Protocols.
Ivan Damgård
Jakob Funder
Jesper Buus Nielsen
Louis Salvail
Published in:
ICITS (2013)
Keyphrases
</>
cryptographic protocols
insider attacks
security protocols
standard model
security properties
authentication protocol
encryption decryption
database systems
sensor networks
response time
cost effective
private information retrieval