Login / Signup
Security analysis of SPAKE2+.
Victor Shoup
Published in:
IACR Cryptol. ePrint Arch. (2020)
Keyphrases
</>
security analysis
public key
smart card
security requirements
high security
security model
security properties
image encryption
authentication protocol
user authentication
encryption scheme
encryption algorithm
proxy signature scheme
private key
operating system
mutual authentication
real time