Man-In-The-Middle Secure Authentication Schemes From LPN and Weak PRFs

Lecture Notes in Computer Science - Germany
doi 10.1007/978-3-642-40084-1_18
Full Text
Abstract

Available in full text

Date
Authors
Publisher

Springer Berlin Heidelberg


Related search