Login / Signup
Secure Card-Based Cryptographic Protocols Using Private Operations Against Malicious Players.
Yoshifumi Manabe
Hibiki Ono
Published in:
SECITC (2020)
Keyphrases
</>
cryptographic protocols
insider attacks
private information retrieval
authentication protocol
smart card
standard model
security properties
security protocols
privacy preserving
formal verification
secure communication
web services
encryption decryption