Back to Search Start Over

How to Guard the Guards Themselves.

Authors :
Yung, Moti
Source :
Fundamentals of Computation Theory (9783642034084); 2009, p1-2, 2p
Publication Year :
2009

Abstract

The first 20 years of modern cryptography dealt with various cryptosystems, their modeling and their security, while assuming the availability of secure keys. Theses keys were the guards of security and based on their unavailability to the adversary, security was proved. In the last decade or so, however, as cryptography has been employed in practice, the realization that keys (the guards of security) needs to be guarded as well was realized and cryptosystems and algorithms have to be designed to take this into consideration. I will review some major directions in this research area. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISBNs :
9783642034084
Database :
Complementary Index
Journal :
Fundamentals of Computation Theory (9783642034084)
Publication Type :
Book
Accession number :
76738278
Full Text :
https://doi.org/10.1007/978-3-642-03409-1_1