FIDO2, CTAP 2.1, and WebAuthn 2: Provable Security and Post-Quantum Instantiation.
Nina BindelCas CremersMang ZhaoPublished in: SP (2023)
Keyphrases
- security issues
- intrusion detection
- information security
- security requirements
- information assurance
- security threats
- key management
- security policies
- access control
- computer security
- security measures
- security mechanisms
- functional requirements
- network security
- security protocols
- security properties
- malware detection
- greedy algorithm
- high security
- security vulnerabilities
- quantum computing
- quantum inspired
- intrusion detection system
- quantum computation