Advertisement

Errors in Computational Complexity Proofs for Protocols

  • Kim-Kwang Raymond Choo
Chapter
Part of the Advances in Information Security book series (ADIS, volume 41)

Keywords

Encryption Scheme Signature Scheme Security Proof Corrupt Query BR93 Model 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer Science+Business Media, LLC 2009

Authors and Affiliations

  1. 1.Australian Institute of CriminologyAustralia

Personalised recommendations