Sciweavers

CRYPTO
2003
Springer
109views Cryptology» more  CRYPTO 2003»
13 years 10 months ago
Weak Key Authenticity and the Computational Completeness of Formal Encryption
Abstract. A significant effort has recently been made to rigorously relate the formal treatment of cryptography with the computational one. A first substantial step in this dire...
Omer Horvitz, Virgil D. Gligor