Next: Message Authentication Codes (MACs).
Up: Efficient Authentication and Signing
Previous: References
In this appendix, we present a more formal statement of the security assumptions
on our cryptographic primitives and sketch the proof of security for one of our
stream authentication schemes. First, here are primitives we use in our schemes.
Next: Message Authentication Codes (MACs).
Up: Efficient Authentication and Signing
Previous: References
Adrian Perrig
Sat Sep 2 17:01:14 PDT 2000