What people are saying - Write a review
We haven't found any reviews in the usual places.
Theoretical Foundations of Security
new protocols and optimal
A language for specifying sequences of authorization transformations
24 other sections not shown
Other editions - View all
A-code access structure Advances in Cryptology agents algebraic algorithm applications assume attack authentication binary blind signature block Boolean functions cipher ciphertext client codeword coin Computer Science construction context-free languages cryptography cryptosystems decryption defined delegation denote DES-like differential cryptanalysis digital signatures distributed ElGamal elliptic curve encryption finite field graph Hamming weight hash function hidden data hyperelliptic curves IEEE implementation input integer Jacobian key escrow Lecture Notes Lemma linear matrix method modulus nonlinearity Notes in Computer obtain output pair paper permutation plaintext polynomial private key probability proof proposed protocol proxy signature public key random number random oracle related-key related-key attacks round function S-boxes secret key secret sharing scheme sequence server SGA-system Shamir signature scheme signer Springer-Verlag stateless string subset Theorem transformation trust variables vector verify visual cryptography zero-knowledge proof