Articles with "ake" as a keyword



Photo by dropthelabelmovement from unsplash

After-the-Fact Leakage-Resilient Identity-Based Authenticated Key Exchange

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Systems Journal"

DOI: 10.1109/jsyst.2017.2685524

Abstract: Authenticated key exchange (AKE) scheme is one of the most widely used cryptographic primitives in practice, even in the Internet-of-Things (IoT) environments. In order to resist side-channel attacks, several works have been proposed for defining… read more here.

Keywords: leakage resilient; ake; identity based; authenticated key ... See more keywords