Login / Signup
A Comprehensive Formal Security Analysis and Revision of the Two-phase Key Exchange Primitive of TPM 2.0.
Qianying Zhang
Shijun Zhao
Zhiping Shi
Yong Guan
Guohui Wang
Published in:
CoRR (2019)
Keyphrases
</>
security analysis
key exchange
smart card
public key
security properties
security requirements
authentication protocol
encryption scheme
formal model
formal methods
distributed systems
network traffic
private key