2014
DOI: 10.1007/978-3-319-08344-5_17
|View full text |Cite
|
Sign up to set email alerts
|

Continuous After-the-Fact Leakage-Resilient Key Exchange

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
18
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 25 publications
(18 citation statements)
references
References 22 publications
0
18
0
Order By: Relevance
“…In the CAFL model [1], each party U i where i ∈ [1, N P ], has a pair of long-term public and secret keys, (pk U i , sk U i ). Each party may run multiple instances of the protocol concurrently or sequentially.…”
Section: The Cafl Modelmentioning
confidence: 99%
See 4 more Smart Citations
“…In the CAFL model [1], each party U i where i ∈ [1, N P ], has a pair of long-term public and secret keys, (pk U i , sk U i ). Each party may run multiple instances of the protocol concurrently or sequentially.…”
Section: The Cafl Modelmentioning
confidence: 99%
“…It is claimed in [1] that the CAFL model addresses "most real world attack scenarios" including active adversarial capabilities (via the Send query), cold-boot attacks (via the Corrupt query), weak random number generators (through the EphemeralKeyReveal query), known key attacks (via the SessionKeyReveal query), and malware attacks (via the EphemeralKeyReveal or the Corrupt queries). It has also been claimed that the CAFL model addresses all the attack scenarios which are addressed by the ASB model, except weak forward secrecy.…”
Section: Comments On the Cafl Modelmentioning
confidence: 99%
See 3 more Smart Citations