搜索结果: 1-1 共查到“军队指挥学 Ephemeral key compromise attack”相关记录1条 . 查询时间(0.062 秒)
Ephemeral key compromise attack on the IB-KA protocol
Ephemeral key compromise attack Authenticated key exchange Canetti-Krawczyk model
2009/12/29
Recently, Dario Fiore and Rosario Gennaro proposed the
IB-KA protocol, which was inspired by MQV protocol. They provide a
full proof of security of IB-KA protocol using techniques developed by
Kraw...