Sign in

Modelling after-the-fact leakage for key exchange.

Janaka AlawatugodaDouglas StebilaColin Boyd
Published in: AsiaCCS (2014)
Keyphrases
  • authentication protocol
  • key exchange
  • security analysis
  • key distribution
  • security requirements
  • security properties
  • diffie hellman
  • key exchange protocol
  • group communication
  • low cost
  • digital signature