Cryptographic Security through Kleene's Theorem and Automata Theory.
Mike Wa NkongoloPublished in: IACR Cryptol. ePrint Arch. (2024)
Keyphrases
- automata theory
- security protocols
- security properties
- graph theory
- key management
- learning theory
- encryption scheme
- fuzzy vault
- cryptographic protocols
- security requirements
- propositional logic
- public key cryptography
- smart card
- access control
- computer science
- student learning
- security mechanisms
- machine learning
- social network analysis