After-the-Fact Leakage-Resilient Identity-Based Authenticated Key Exchange


Authenticated key exchange (AKE) scheme is one of the most widely used cryptographic primitives in practice, even in the Internet-of-Things (IoT) environments. In order to resist side-channel attacks, several works have been proposed for defining leakage-resilient (LR) security models and constructing LR-AKE protocols. However, all these LR-AKE schemes… (More)
DOI: 10.1109/JSYST.2017.2685524

2 Figures and Tables


  • Presentations referencing similar topics