Write, autoreview, editor, reviewer
3,129
edits
m (→Properties) |
|||
Line 48: | Line 48: | ||
*This section is a list of all required information and specific details which were not given in the wordy outline. | *This section is a list of all required information and specific details which were not given in the wordy outline. | ||
*Contains no subsections. One could list all that one thinks is important for the reader to know and can be extracted from the protocol. e.g: | *Contains no subsections. One could list all that one thinks is important for the reader to know and can be extracted from the protocol. e.g: | ||
#Assumptions on adversary. A link to the [[security definitions|security definitions]] section on the supplementary information page should be provided if this is listed (This is mandatory item for almost every protocol except some building blocks protocols). | #Assumptions on adversary. A link to the [[security definitions|security definitions]] section on the supplementary information page should be provided if this is listed (This is mandatory item for almost every protocol except some building blocks protocols). | ||
#List of parameters used e.g. threshold value etc. | #List of parameters used e.g. threshold value etc. |