Browsing Combinatorics and Optimization by Subject "Key Establishment"
Now showing items 1-1 of 1
-
Post-Quantum Security of Authenticated Key Establishment Protocols
(University of Waterloo, 2016-04-20)We present a security model for authenticated key establishment that allows for quantum interactions between the adversary and quantum oracles that emulate classical parties, resulting in a truly post-quantum security ...