Leakage resilient authenticated key exchange secure in the auxiliary input model

Authenticated key exchange (AKE) protocols allow two parties communicating over an insecure network to establish a common secret key. They are among the most widely used cryptographic protocols in practice. In order to resist key-leakage attacks, several leakage resilient AKE protocols have been pro...

全面介紹

Saved in:
書目詳細資料
Main Authors: YANG, Guomin, MU, Yi, SUSILO, Willy, WONG, Duncan S.
格式: text
語言:English
出版: Institutional Knowledge at Singapore Management University 2013
主題:
在線閱讀:https://ink.library.smu.edu.sg/sis_research/7379
https://ink.library.smu.edu.sg/context/sis_research/article/8382/viewcontent/Leakage_resilient_authenticated_key_exchange_secure_in_the_auxiliary_input_model.pdf
標簽: 添加標簽
沒有標簽, 成為第一個標記此記錄!