Leakage resilient authenticated key exchange secure in the auxiliary input model

Authenticated key exchange (AKE) protocols allow two parties communicating over an insecure network to establish a common secret key. They are among the most widely used cryptographic protocols in practice. In order to resist key-leakage attacks, several leakage resilient AKE protocols have been pro...

Full description

Saved in:
Bibliographic Details
Main Authors: YANG, Guomin, MU, Yi, SUSILO, Willy, WONG, Duncan S.
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2013
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/7379
https://ink.library.smu.edu.sg/context/sis_research/article/8382/viewcontent/Leakage_resilient_authenticated_key_exchange_secure_in_the_auxiliary_input_model.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
Be the first to leave a comment!
You must be logged in first