A Formal Treatment of the Limits of Authenticated Key Exchange Security
Crossref DOI link: https://doi.org/10.1007/978-3-032-20684-8_5
Published Online: 2026-03-17
Published Print: 2026
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Feltz, Michèle
Cremers, Cas https://orcid.org/0000-0003-0322-2293
Text and Data Mining valid from 2026-01-01
Version of Record valid from 2026-01-01
Chapter History
First Online: 17 March 2026
Disclosure of Interests
: The authors have no competing interests to declare that are relevant to the content of this article.