Security analysis of SM2 key exchange protocol in TPM2.0.
Shijun ZhaoLi XiQianying ZhangYu QinDengguo FengPublished in: Secur. Commun. Networks (2015)
Keyphrases
- security analysis
- key exchange protocol
- key exchange
- diffie hellman
- public key
- security properties
- encryption scheme
- smart card
- secure communication
- security requirements
- private key
- authentication protocol
- information security
- digital signature
- security mechanisms
- image quality
- secret key
- cost effective
- access control