Search
Now showing items 1-2 of 2
Delayed-Input and Non-Malleable Cryptographic Protocols
(Universita degli studi di Salerno, 2018-03-12)
A major goal in the design of cryptographic protocols is to re-
duce the number of communication rounds. Since a cryptographic
protocol usually consists of a composition and interplay of some
subprotocols and cryptographic ...
Round and computational efficiency of two-party protocols
(Universita degli studi di Salerno, 2018-03-03)
A cryptographic protocol is defined by the behaviour of the involved parties and the messages
that those parties send to each other. Beside the functionality and the security that a cryptographic
protocol provides, it ...