Inspec keywords: cryptographic protocols

Other keywords: gap DH assumption; security proofs; adversarial capabilities; one-round implicitly authenticated Diffie-Hellman key exchange protocols; extended CK model; secret leakage; Canetti-Krawczyk model; authenticated key exchange protocols; unified security model; random oracle model; OAKE protocol

Subjects: Protocols; Cryptography; Data security