E. N. Shkorkina

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
The implementation of cryptographic protocols in systems with resource-constrained devices and possible transfer of laborious calculations to a cloud server is considered. In this case, the device performs “simple” arithmetic operations. A tripartite key-agreement with two servers and the model with one malicious computer is proposed.
  • 1