Articles with "resilient key" as a keyword



Photo from wikipedia

On the leakage-resilient key exchange

Sign Up to like & get
recommendations!
Published in 2017 at "Journal of Mathematical Cryptology"

DOI: 10.1515/jmc-2016-0003

Abstract: Abstract Typically, secure channels are constructed from an authenticated key exchange (AKE) protocol, which authenticates the communicating parties based on long-term public keys and establishes secret session keys. In this paper we address the partial… read more here.

Keywords: resilient key; leakage resilient; security; key exchange ... See more keywords