Sfoglia Informatica ed Ingegneria dell'Informazione per Soggetto "Proof system"
Items 1-2 di 2
-
Delayed-Input and Non-Malleable Cryptographic Protocols
(Universita degli studi di Salerno, 2018-03-12)A major goal in the design of cryptographic protocols is to re- duce the number of communication rounds. Since a cryptographic protocol usually consists of a composition and interplay of some subprotocols and cryptographic ... -
Round and computational efficiency of two-party protocols
(Universita degli studi di Salerno, 2018-03-03)A cryptographic protocol is defined by the behaviour of the involved parties and the messages that those parties send to each other. Beside the functionality and the security that a cryptographic protocol provides, it ...