Man-In-The-Middle Secure Authentication Schemes From LPN and Weak PRFs
Lecture Notes in Computer Science - Germany
doi 10.1007/978-3-642-40084-1_18
Full Text
Open PDFAbstract
Available in full text
Date
January 1, 2013
Authors
Publisher
Springer Berlin Heidelberg