Login / Signup
Beyond Birthday Bound Secure Fresh Rekeying: Application to Authenticated Encryption.
Bart Mennink
Published in:
IACR Cryptol. ePrint Arch. (2020)
Keyphrases
</>
key exchange
key management
upper bound
end to end
key exchange protocol
worst case
error bounds
cryptographic protocols