Sign Up to like & get
recommendations!
0
Published in 2018 at "IEEE Systems Journal"
DOI: 10.1109/jsyst.2017.2685524
Abstract: Authenticated key exchange (AKE) scheme is one of the most widely used cryptographic primitives in practice, even in the Internet-of-Things (IoT) environments. In order to resist side-channel attacks, several works have been proposed for defining…
read more here.
Keywords:
leakage resilient;
ake;
identity based;
authenticated key ... See more keywords