Skip to main content
Log in

Vulnerabilities of one cryptographic protocol

  • Brief Communications
  • Published:
Moscow University Mathematics Bulletin Aims and scope

Abstract

Possible attacks on cryptographic protocol “Mental Poker” are described.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

References

  1. B. Ya. Ryabko and A. N. Fionov, Cryptographic Methods for Guarding Information (Goryachaya Liniya — Telekom, Moscow, 2005) [in Russian].

    Google Scholar 

  2. D. Coppersmith, “Cheating at Mental Poker,” Lect. Notes Comput. Sci. Advances in Cryptology. 218, 104 (1986).

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Additional information

Original Russian Text © D.V.Kop’ev, 2009, published in Vestnik Moskovskogo Universiteta, Matematika. Mekhanika, 2009, Vol. 64, No. 1, pp. 65–66.

About this article

Cite this article

Kop’ev, D.V. Vulnerabilities of one cryptographic protocol. Moscow Univ. Math. Bull. 64, 44–45 (2009). https://doi.org/10.3103/S0027132209010112

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S0027132209010112

Keywords

Navigation