Cryptology ePrint Archive: Report 2014/131
Available versions in chronological order
20140224:032915 (posted 24-Feb-2014 03:29:15 UTC)
Modelling After-the-fact Leakage for Key Exchange
Janaka Alawatugoda and Douglas Stebila and Colin Boyd
Original publication (with minor differences): 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2014)
20140227:070318 (posted 27-Feb-2014 07:03:18 UTC)
Modelling After-the-fact Leakage for Key Exchange
Janaka Alawatugoda and Douglas Stebila and Colin Boyd
Original publication (with minor differences): 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2014)
[
Cryptology ePrint archive
]