On the Feasibility of Key Compromise Impersonation Attacks Against the Elliptic Curve Version of the MTI/C0 Key Agreement Protocol

International Journal of Information and Electronics Engineering
doi 10.7763/ijiee.2012.v2.213
Full Text
Abstract

Available in full text

Date
Authors
Publisher

EJournal Publishing


Related search