• Delayed-Input and Non-Malleable Cryptographic Protocols 

      Siniscalchi, Luisa (Universita degli studi di Salerno, 2018-03-12)
      A major goal in the design of cryptographic protocols is to re- duce the number of communication rounds. Since a cryptographic protocol usually consists of a composition and interplay of some subprotocols and cryptographic ...
    • Round and computational efficiency of two-party protocols 

      Ciampi, Michele (Universita degli studi di Salerno, 2018-03-03)
      A cryptographic protocol is defined by the behaviour of the involved parties and the messages that those parties send to each other. Beside the functionality and the security that a cryptographic protocol provides, it ...