J Pan, L Wang - … Security: 5th International Conference, ProvSec 2011 …, 2011 - Springer
In this paper, we propose an authenticated key exchange (AKE) protocol under the
computational Diffie-Hellman (CDH) assumption with respect to the strengthened eCK …