Comparing the Pre- and Post-specified Peer Models for Key Agreement
From MaRDI portal
Publication:3511151
Recommendations
Cited in
(5)- Designing efficient authenticated key exchange resilient to leakage of ephemeral secret keys
- Comparing the pre- and post-specified peer models for key agreement
- Considering two MAC under SIG variants of the basic SIGMA protocol
- Secure communication channel establishment: TLS 1.3 (over TCP Fast Open) versus QUIC
- Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman protocols
This page was built for publication: Comparing the Pre- and Post-specified Peer Models for Key Agreement
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3511151)