Analysis of information leakage due to operative errors in card-based protocols
From MaRDI portal
Publication:1671008
DOI10.1007/978-3-319-94667-2_21zbMath1465.68093OpenAlexW2809853573WikidataQ62043381 ScholiaQ62043381MaRDI QIDQ1671008
Publication date: 6 September 2018
Full work available at URL: https://doi.org/10.1007/978-3-319-94667-2_21
Modes of computation (nondeterministic, parallel, interactive, probabilistic, etc.) (68Q10) Cryptography (94A60) Authentication, digital signatures and secret sharing (94A62)
Related Items (5)
Card-based cryptographic protocols with a standard deck of cards using private operations ⋮ Information leakage due to operative errors in card-based protocols ⋮ Multi-party computation based on physical coins ⋮ Actively revealing card attack on card-based protocols ⋮ A secure three-input and protocol with a standard deck of minimal cards
This page was built for publication: Analysis of information leakage due to operative errors in card-based protocols