Login / Signup

)-Query Attack on Any Key Exchange from a Random Oracle.

Boaz BarakMohammad Mahmoody-Ghidary
Published in: CRYPTO (2009)
Keyphrases
  • key exchange
  • key exchange protocol
  • response time
  • query processing
  • database
  • data sources
  • diffie hellman
  • low cost
  • load balancing
  • key distribution