Login / Signup
(De)Compositions of Cryptographic Schemes and their Applications to Protocols.
Romain Janvier
Yassine Lakhnech
Laurent Mazaré
Published in:
IACR Cryptol. ePrint Arch. (2005)
Keyphrases
</>
cryptographic protocols
security protocols
security properties
smart card
information systems
cryptographic algorithms
authentication protocol
private information retrieval
key management
public key encryption
distributed databases
key distribution
communication protocols
multi party
security requirements