Login / Signup
On the Security Properties of Combinatorial All-or-nothing Transforms.
Yujie Gu
Sonata Akao
Navid Nasr Esfahani
Ying Miao
Kouichi Sakurai
Published in:
ISIT (2022)
Keyphrases
</>
security properties
security requirements
formal model
security analysis
security protocols
cryptographic protocols
formal methods
key agreement
data integration
security policies
elliptic curve