next up previous
Next: Security



The following pages analysis the security of our key-distribution scheme against realistically restricted adversaries. We give an upper bound on the amount of information the adversary can get on the final key.

Louis Salvail 2001-06-15