• English
    • italiano
  • English 
    • English
    • italiano
  • Login
Search 
  •   DSpace Home
  • Tesi di dottorato
  • Area Ingegneria civile, elettronica, industriale
  • Informatica ed Ingegneria dell'Informazione
  • Search
  •   DSpace Home
  • Tesi di dottorato
  • Area Ingegneria civile, elettronica, industriale
  • Informatica ed Ingegneria dell'Informazione
  • Search
JavaScript is disabled for your browser. Some features of this site may not work without it.

Search

Show Advanced FiltersHide Advanced Filters

Filters

Use filters to refine the search results.

Now showing items 1-2 of 2

  • Sort Options:
  • Relevance
  • Title Asc
  • Title Desc
  • Issue Date Asc
  • Issue Date Desc
  • Results Per Page:
  • 5
  • 10
  • 20
  • 40
  • 60
  • 80
  • 100
Thumbnail

Round and computational efficiency of two-party protocols 

Ciampi, Michele (2018-03-03)
A cryptographic protocol is defined by the behaviour of the involved parties and the messages that those parties send to each other. Beside the functionality and the security that a cryptographic protocol provides, it is ...
Thumbnail

Delayed-Input and Non-Malleable Cryptographic Protocols 

Siniscalchi, Luisa (2018-03-12)
A major goal in the design of cryptographic protocols is to re- duce the number of communication rounds. Since a cryptographic protocol usually consists of a composition and interplay of some subprotocols and cryptographic ...
EleA themes by Ugsiba
 

 

Browse

All of DSpaceCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsBy Submit DateThis CollectionBy Issue DateAuthorsTitlesSubjectsBy Submit Date

My Account

LoginRegister

Discover

AuthorCiampi, Michele (1)Siniscalchi, Luisa (1)SubjectINF/01 INFORMATICA (2)
Proof system (2)
Delayed-input (1)Non-malleability (1)Non-malleable commitment (1)Properties (1)Two-party computation (1)... View MoreDate Issued2018 (2)Has File(s)Yes (2)
EleA themes by Ugsiba