Improved Security Proof for Modular Exponentiation Bits.
Kewei LvWenjie QinKe WangPublished in: NSS (2016)
Keyphrases
- modular exponentiation
- secure communication
- public key cryptosystems
- key exchange
- addition chains
- intrusion detection
- elliptic curve
- public key cryptography
- public key
- security issues
- security policies
- access control
- key management
- network security
- information security
- wireless sensor networks
- security analysis
- security requirements
- ad hoc networks