7 lines
260 B
Plaintext
7 lines
260 B
Plaintext
|
The protocols here are modeled according to their description in the
|
||
|
SPORE library.
|
||
|
|
||
|
In the 'key-compromise' directory one can find the same protocols, but
|
||
|
modified to model the compromise of earlier sessions and the leakage of
|
||
|
the corresponding local values.
|