On the Feasibility of Key Compromise Impersonation Attacks Against the Elliptic Curve Version of the MTI/C0 Key Agreement Protocol
International Journal of Information and Electronics Engineering
doi 10.7763/ijiee.2012.v2.213
Full Text
Open PDFAbstract
Available in full text
Date
January 1, 2012
Authors
Publisher
EJournal Publishing