Sign in

Perfectly Secure Message Transmission in Two Rounds.

Gabriele SpiniGilles Zémor
Published in: TCC (B1) (2016)
Keyphrases
  • message transmission
  • key management
  • security requirements
  • security analysis
  • security mechanisms
  • cryptographic protocols
  • network latency