Sign Up to like & get
recommendations!
1
Published in 2017 at "Journal of Mathematical Cryptology"
DOI: 10.1515/jmc-2016-0003
Abstract: Abstract Typically, secure channels are constructed from an authenticated key exchange (AKE) protocol, which authenticates the communicating parties based on long-term public keys and establishes secret session keys. In this paper we address the partial…
read more here.
Keywords:
resilient key;
leakage resilient;
security;
key exchange ... See more keywords