Login / Signup
Legally keeping secrets from mobile operators: Lawful Interception Key Exchange (LIKE).
Ghada Arfaoui
Olivier Blazy
Xavier Bultel
Pierre-Alain Fouque
Adina Nedelcu
Cristina Onete
Published in:
IACR Cryptol. ePrint Arch. (2020)
Keyphrases
</>
key exchange
security analysis
diffie hellman
key exchange protocol
secure communication
computing environments
digital signature
password based authenticated key exchange
data management
mobile agents