Our Solution
-
Generic
-
Efficient
-
Long messages
-
Resilient against Person-in-the-Middle attacks
-
No cryptographic hashing
-
Deniable Authentication
Previous slide | Next slide | Back to first slide | View graphic version |