Sign in

Malicious Player Card-Based Cryptographic Protocols with a Standard Deck of Cards Using Private Operations.

Tomoya MorookaYoshifumi ManabeKazumasa Shinagawa
Published in: ISPEC (2023)
Keyphrases
  • cryptographic protocols
  • insider attacks
  • standard model
  • low cost
  • authentication protocol
  • security properties
  • database
  • digital libraries
  • distributed systems
  • smart card