Main Page: Difference between revisions

Jump to navigation Jump to search
103 bytes removed ,  25 September 2018
Line 27: Line 27:


===Outline===
===Outline===
This section is a simple wordy outline of the protocol. It should tell you what the protocol is, but not the minute details of the protocol. As far as possible, one must refrain from using mathematical notations or variables. It should be kept as a general outline of the Procedure. It should not contain any new terminology that has not been explained before or here itself. If one does, it should be linked to a Wikipedia page or a supplementary draft, whichever preferred. This part should be self-consistent, precise but self-explanatory. If we use bullet points and give steps/levels some name, one should aim at describing the target of the step in the first line and then proceed with the ’what’ and ’how’ of the step. A key point to be noted, we do not aim at answering the ’why’ for different steps nor do we provide with the security proof. That would just make the description as long as the paper. It is redundant and not the aim of this formal description. The reader may refer to the specific paper in order to understand any such detail.
This section is a simple wordy outline of the protocol which tells one about the method used, but not the minute details of the protocol. As far as possible, one must refrain from using mathematical notations or variables. It is to be kept as a general outline of the Procedure. It should not contain any new terminology that has not been explained before or here itself. If one does, it should be linked to a Wikipedia page or a supplementary draft, whichever is preferred. This part should be self-consistent, precise but self-explanatory. If using bullet points and give steps/levels some name, one should aim at describing the target of the step in the first line and then proceed with the ’what’ and ’how’ of the step. A key point to be noted, this description does not aim at answering the ’why’ for different steps nor does it provide the reader with proofs. The reader may refer to the specific paper in order to understand any such detail.
 
===Figure===
===Figure===
A figure of the protocol in jpeg format could be used. A pdf file of the image drawn using tikz or cryptopackage would also suffice.
A figure of the protocol in jpeg format could be used. A pdf file of the image drawn using tikz or cryptopackage would also suffice.
Write, autoreview, editor, reviewer
3,125

edits

Navigation menu