Strongly leakage resilient authenticated key exchange, revisited

Authenticated Key Exchange (AKE) protocols allow two (or multiple) parties to authenticate each other and agree on a common secret key, which is essential for establishing a secure communication channel over a public network. AKE protocols form a central component in many network security standards...

Full description

Saved in:
Bibliographic Details
Main Authors: YANG, Guomin, CHEN, Rongmao, MU, Yi, SUSILO, Willy, GUO Fuchun, LI, Jie
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2019
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/7303
https://ink.library.smu.edu.sg/context/sis_research/article/8306/viewcontent/s10623_019_00656_3.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
Be the first to leave a comment!
You must be logged in first