Login / Signup
The Cut-and-Choose Game and Its Application to Cryptographic Protocols.
Ruiyu Zhu
Yan Huang
Jonathan Katz
Abhi Shelat
Published in:
USENIX Security Symposium (2016)
Keyphrases
</>
cryptographic protocols
computer games
standard model
video games
game theory
security properties
nash equilibrium
game playing
educational games
security protocols
database
authentication protocol