Login / Signup
Three-Pass Protocol on Permutations: Implementation Example and Security.
Emil Faure
Anatoly Shcherba
Artem Lavdanskyi
Mykola Makhynko
Muhabbat Khizirova
Published in:
CPITS (2024)
Keyphrases
</>
cryptographic protocols
security protocols
key agreement protocol
authentication protocol
key exchange protocol
security model
security properties
security requirements
security analysis
communication protocols
protocol specification
information security
network security
group communication
mobile payment