Serge Vaudenay
We examine key agreement protocols providing: (i) key authentication, (ii) key confirmation, and (iii) forward secrecy. Attacks are presented against previous two-party key agreement schemes and we subsequently present a protocol providing the properties l ...
1996