Login / Signup
On Making U2F Protocol Leakage-Resilient via Re-keying.
Donghoon Chang
Sweta Mishra
Somitra Kumar Sanadhya
Ajit Pratap Singh
Published in:
IACR Cryptol. ePrint Arch. (2017)
Keyphrases
</>
lightweight
artificial intelligence
cryptographic protocols
protocol specification
databases
knowledge base
database systems
electronic commerce
end to end
multi party
network protocols