Back to Search
Start Over
How to Guard the Guards Themselves.
- Source :
- Fundamentals of Computation Theory (9783642034084); 2009, p1-2, 2p
- Publication Year :
- 2009
-
Abstract
- The first 20 years of modern cryptography dealt with various cryptosystems, their modeling and their security, while assuming the availability of secure keys. Theses keys were the guards of security and based on their unavailability to the adversary, security was proved. In the last decade or so, however, as cryptography has been employed in practice, the realization that keys (the guards of security) needs to be guarded as well was realized and cryptosystems and algorithms have to be designed to take this into consideration. I will review some major directions in this research area. [ABSTRACT FROM AUTHOR]
Details
- Language :
- English
- ISBNs :
- 9783642034084
- Database :
- Complementary Index
- Journal :
- Fundamentals of Computation Theory (9783642034084)
- Publication Type :
- Book
- Accession number :
- 76738278
- Full Text :
- https://doi.org/10.1007/978-3-642-03409-1_1