Keyword : proactive security

A Simple Leakage-Resilient Authenticated Key Establishment Protocol, Its Extensions, and Applications
SeongHan SHIN Kazukuni KOBARA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/03/01
Vol. E88-A  No. 3 ; pp. 736-754
Type of Manuscript:  PAPER
Category: Information Security
entropy of passwordson-line and off-line attacksauthenticationkey establishment protocolleakage of stored secretsproactive securityDDH problemstandard model
 Summary | Full Text:PDF(524.8KB)