Login / Signup
Information-Theoretically Secure Protocols and Security Under Composition.
Eyal Kushilevitz
Yehuda Lindell
Tal Rabin
Published in:
IACR Cryptol. ePrint Arch. (2009)
Keyphrases
</>
security level
security issues
information security
security requirements
sensitive data
application level
key management
authentication protocol
cryptographic protocols
security properties
identity management