Composable Security of Generalized BB84 Protocols Against General Attacks.
Michel BoyerRotem LissTal MorPublished in: CoRR (2022)
Keyphrases
- security protocols
- cryptographic protocols
- security threats
- computer security
- security mechanisms
- special case
- security properties
- security vulnerabilities
- security flaws
- security services
- security problems
- communication protocols
- key management
- countermeasures
- network security
- key agreement protocol
- information leakage
- cyber attacks
- dos attacks
- security policies
- information security
- denial of service attacks
- security measures
- intrusion detection
- stream cipher
- cryptographic algorithms
- access control