Collusion Analysis of Cryptographic Protocols

  • Steven H. Low Nicholas F. Maxemchrik
  • Published 2004
As network applications such as electronac commerce proliferate, complex communications protocols that employ cryptographic building blocks, such as encryption and authentication, will become more common. W e view a cryptographic protocol as a process by which information is transferred among some users and hidden from others. The collusion problem… CONTINUE READING