Login / Signup

Timed encryption with application to deniable key exchange.

Shaoquan Jiang
Published in: Theor. Comput. Sci. (2014)
Keyphrases
  • operating system
  • key exchange
  • security analysis
  • digital signature
  • information sharing
  • information systems
  • encryption scheme
  • authentication protocol
  • diffie hellman