Retrieving "Cryptographic Protocol" from the archives

Cross-reference notes under review

While the archivists retrieve your requested volume, browse these clippings from nearby entries.

  1. Function Composition

    Linked via "cryptographic protocols"

    (g \circ f)^{-1} = f^{-1} \circ g^{-1}
    $$
    This property is frequently invoked in cryptographic protocols where the sequence of encryption steps must be perfectly reversible by an inverted sequence of decryption steps [5].
    Composition in Specific Mathematical Contexts