Login / Signup

On the Validity of the phi-Hiding Assumption in Cryptographic Protocols.

Christian SchriddeBernd Freisleben
Published in: ASIACRYPT (2008)
Keyphrases
  • cryptographic protocols
  • standard model
  • security properties
  • authentication protocol
  • real time
  • data model
  • data integration
  • security protocols
  • locally decodable codes