Login / Signup
Information-theoretically secure protocols and security under composition.
Eyal Kushilevitz
Yehuda Lindell
Tal Rabin
Published in:
STOC (2006)
Keyphrases
</>
security services
intrusion detection
security protocols
security level
authentication protocol
information leakage
information security
network security
security mechanisms
security analysis
cryptographic protocols