299
edits
No edit summary |
No edit summary |
||
Line 3: | Line 3: | ||
==Properties== | ==Properties== | ||
*The security of the protocol requires that no sensitive information is exchanged during its execution can leak to the eavesdropper. | *The security of the protocol requires that no sensitive information is exchanged during its execution can leak to the eavesdropper. | ||
==Knowledge Graph== | |||
{{graph}} | |||
==References== | ==References== | ||
#[https://www.sciencedirect.com/science/article/pii/0022000081900337 Wegman and Carter (1981)] | #[https://www.sciencedirect.com/science/article/pii/0022000081900337 Wegman and Carter (1981)] |
edits