Login / Signup
On the (im)possibility of perennial message recognition protocols without public-key cryptography.
Madeline González Muñiz
Peeter Laud
Published in:
SAC (2011)
Keyphrases
</>
public key cryptography
security services
public key
security model
elliptic curve
public key infrastructure
elliptic curve cryptography
security protocols
lightweight
similarity search
key management
provably secure
session key