On the Limits of Authenticated Key Exchange Security with an Application to Bad Randomness.
Michèle FeltzCas CremersPublished in: IACR Cryptol. ePrint Arch. (2014)
Keyphrases
- key exchange
- key exchange protocol
- security analysis
- diffie hellman
- password based authenticated key exchange
- digital signature
- key distribution
- elliptic curve
- secure communication
- key agreement protocol
- encryption scheme
- security requirements
- smart card
- standard model
- security properties
- session key
- authentication protocol
- information systems
- public key