Selected Topics of Cryptographic Protocols Synthesis
Creating a secure protocol:main questions Which main lessons should we learn before starting protocolsynthesis?How can we create a secure protocol from a scratch,without《field experience》and a security contest(e.g.like for AES)?How do we choose between eciency and theoretical security?If we have a security proof,how should we exploit it in theconstruction of the end protocol?Which questions are left behind in most security models?How to organize a security review process?
Stanislav V.Smyhlyaev
Head of information security department,CryptoPro LLC
国内会议
西安
英文
1-145
2017-09-01(万方平台首次上网日期,不代表论文的发表时间)