Login / Signup
Provably Secure Mobile Key Exchange: Applying the Canetti-Krawczyk Approach.
Yiu Shing Terry Tin
Colin Boyd
Juan Manuel González Nieto
Published in:
ACISP (2003)
Keyphrases
</>
provably secure
diffie hellman
key exchange
public key
standard model
security analysis
key management
elliptic curve
secret key
encryption scheme
security model
signature scheme
group communication
digital signature
secure communication
security properties
key distribution
response time