Security Analysis of Poker-Resembled Protocol Based on Hidden Number Problem

Dong Su, Kewei Lv. Security Analysis of Poker-Resembled Protocol Based on Hidden Number Problem. In Lean Yu, Kin Keung Lai, S. K. Mishra, editors, Proceedings of the Second International Joint Conference on Computational Sciences and Optimization, CSO 2009, Sanya, Hainan, China, 24-26 April 2009, Volume 2. pages 306-308, IEEE Computer Society, 2009. [doi]

@inproceedings{SuL09-2,
  title = {Security Analysis of Poker-Resembled Protocol Based on Hidden Number Problem},
  author = {Dong Su and Kewei Lv},
  year = {2009},
  doi = {10.1109/CSO.2009.335},
  url = {http://doi.ieeecomputersociety.org/10.1109/CSO.2009.335},
  tags = {rule-based, protocol, analysis, security},
  researchr = {https://researchr.org/publication/SuL09-2},
  cites = {0},
  citedby = {0},
  pages = {306-308},
  booktitle = {Proceedings of the Second International Joint Conference on Computational Sciences and Optimization, CSO 2009, Sanya, Hainan, China, 24-26 April 2009, Volume 2},
  editor = {Lean Yu and Kin Keung Lai and S. K. Mishra},
  publisher = {IEEE Computer Society},
  isbn = {978-0-7695-3605-7},
}