Constructing cryptographic definitions

P. Rogaway

Volume 3, Issue 2 , July 2011, , Pages 69-76

http://dx.doi.org/10.22042/isecure.2015.3.2.2

Abstract
  This paper mirrors an invited talk to ISCISC 2011. It is not a conventional paper so much as an essay summarizing thoughts on a little-talked-about subject. My goal is to intermix some introspection about definitions with examples of them, these examples drawn mostly from cryptography. Underpinning our ...  Read More