Login / Signup
DECT Security Analysis.
Erik Tews
Published in:
IACR Cryptol. ePrint Arch. (2012)
Keyphrases
</>
security analysis
smart card
public key
security requirements
high security
security properties
encryption scheme
security model
mutual authentication
authentication protocol
user authentication
proxy signature scheme
encryption algorithm
cost effective
signature scheme
image encryption