Sign in

On the Security Properties of Combinatorial All-or-nothing Transforms.

Yujie GuSonata AkaoNavid Nasr EsfahaniYing MiaoKouichi Sakurai
Published in: ISIT (2022)
Keyphrases
  • security properties
  • security requirements
  • formal model
  • security analysis
  • security protocols
  • cryptographic protocols
  • formal methods
  • key agreement
  • data integration
  • security policies
  • elliptic curve