Login / Signup
Modelling after-the-fact leakage for key exchange.
Janaka Alawatugoda
Douglas Stebila
Colin Boyd
Published in:
AsiaCCS (2014)
Keyphrases
</>
authentication protocol
key exchange
security analysis
key distribution
security requirements
security properties
diffie hellman
key exchange protocol
group communication
low cost
digital signature