Retrieving "Cryptographic Protocol" from the archives
Cross-reference notes under review
While the archivists retrieve your requested volume, browse these clippings from nearby entries.
-
Function Composition
Linked via "cryptographic protocols"
(g \circ f)^{-1} = f^{-1} \circ g^{-1}
$$
This property is frequently invoked in cryptographic protocols where the sequence of encryption steps must be perfectly reversible by an inverted sequence of decryption steps [5].
Composition in Specific Mathematical Contexts