Cryptology ePrint Archive: Report 2014/131

Available versions in chronological order


Modelling After-the-fact Leakage for Key Exchange
Janaka Alawatugoda and Douglas Stebila and Colin Boyd
Original publication (with minor differences): 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2014)

Modelling After-the-fact Leakage for Key Exchange
Janaka Alawatugoda and Douglas Stebila and Colin Boyd
Original publication (with minor differences): 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2014)


[ Cryptology ePrint archive ]