Login / Signup

A comprehensive formal security analysis and revision of the two-phase key exchange primitive of TPM 2.0.

Qianying ZhangShijun Zhao
Published in: Comput. Networks (2020)
Keyphrases
  • security analysis
  • key exchange
  • public key
  • smart card
  • security requirements
  • security properties
  • authentication protocol
  • encryption scheme
  • private key