Login / Signup
Limiting the impact of unreliable randomness in deployed security protocols.
Liliya R. Akhmetzyanova
Cas Cremers
Luke Garratt
Stanislav Smyshlyaev
Nick Sullivan
Published in:
CSF (2020)
Keyphrases
</>
security protocols
automated design
cryptographic algorithms
key management
security services
artificial immune algorithm
security mechanisms
security properties
authentication protocol
cryptographic protocols
secure communication
databases
security requirements