Practical covert authentication
From MaRDI portal
Recommendations
Cited in
(7)- Short concurrent covert authenticated key exchange (short cAKE)
- On the round complexity of covert computation
- Implicit zero-knowledge arguments and applications to the malicious setting
- Private Mutual Authentication and Conditional Oblivious Transfer
- From Passive to Covert Security at Low Cost
- Practical witness encryption for algebraic languages or how to encrypt under Groth-Sahai proofs
- Covert authentication from lattices
This page was built for publication: Practical covert authentication
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5402996)