Login / Signup
Card-Based Cryptographic Protocols with Malicious Players Using Private Operations.
Yoshifumi Manabe
Hibiki Ono
Published in:
New Gener. Comput. (2022)
Keyphrases
</>
cryptographic protocols
insider attacks
private information retrieval
standard model
security properties
authentication protocol
smart card
game theory
privacy preserving
security protocols
database