A Sufficient Condition for Secure Ping-Pong Protocols.
Masao MoriPublished in: IACR Cryptol. ePrint Arch. (2001)
Keyphrases
- sufficient conditions
- ping pong
- cryptographic protocols
- security protocols
- key distribution
- authentication protocol
- key exchange
- key agreement protocol
- multi party
- lyapunov function
- exponential stability
- asymptotic stability
- linear systems
- key management
- fixed point
- neural network
- multi class
- linear complementarity problem
- diffie hellman
- uniform convergence
- learning algorithm
- linear matrix inequality
- smart card
- security requirements