Login / Signup
Malicious Player Card-Based Cryptographic Protocols with a Standard Deck of Cards Using Private Operations.
Tomoya Morooka
Yoshifumi Manabe
Kazumasa Shinagawa
Published in:
ISPEC (2023)
Keyphrases
</>
cryptographic protocols
insider attacks
standard model
low cost
authentication protocol
security properties
database
digital libraries
distributed systems
smart card