Login / Signup
Applications of H-Technique: Revisiting Symmetric Key Security Analysis.
Ashwin Jha
Mridul Nandi
Published in:
IACR Cryptol. ePrint Arch. (2018)
Keyphrases
</>
security analysis
symmetric key
security requirements
public key
smart card
security model
authentication protocol
encryption scheme
security properties
encryption algorithm
private key
access control
software architecture
personal information