Introduction to the Special Session on Secure Implementations.
Régis LeveuglePublished in: IOLTS (2005)
Keyphrases
- efficient implementation
- security requirements
- standard model
- learning algorithm
- genetic algorithm
- lightweight
- covert channel
- security issues
- identity management
- security protocols
- authentication scheme
- scalar product
- diffie hellman
- key distribution
- authentication protocol
- security analysis
- multi party
- data sharing
- low cost