On the Security of Non-Interactive Key Exchange against Related-Key Attacks.
Hiraku MoritaJacob C. N. SchuldtTakahiro MatsudaGoichiro HanaokaTetsu IwataPublished in: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. (2017)
Keyphrases
- key exchange
- secure communication
- security analysis
- security protocols
- diffie hellman
- security mechanisms
- smart card
- password based authenticated key exchange
- private key
- key exchange protocol
- security requirements
- key distribution
- network security
- secret key
- public key
- information security
- digital signature
- cryptographic protocols
- intrusion detection
- access control
- resource constrained