Inproceedings,

Taxonomical Security Consideration of Authenticated Key Exchange Resilient to Intermediate Computation Leakage.

, and .
ProvSec, volume 6980 of Lecture Notes in Computer Science, page 348-365. Springer, (2011)

Meta data

Tags

Users

  • @dblp

Comments and Reviews