How to Compare Bandwidth Constrained Two-Party Secure Messaging Protocols: A Quest for A More Efficient and Secure Post-Quantum Protocol
Benedikt Auerbach
34th USENIX Security Symposium (USENIX Security '25) · Day 3 · Crypto 4: Systems and Protocols
Benedikt Auerbach
34th USENIX Security Symposium (USENIX Security '25) · Day 3 · Crypto 4: Systems and Protocols