Login / Signup

On the (Im)possibility Results for Strong Attack Models for Public Key Cryptsystems.

Yutaka KawaiYusuke SakaiNoboru Kunihiro
Published in: J. Internet Serv. Inf. Secur. (2011)
Keyphrases
  • public key
  • secret key
  • security analysis
  • authentication protocol
  • session key
  • signature scheme
  • security model
  • public key cryptosystem