PQXDH in Lean
PQXDH in Lean
Table of Contents
1.
Diffie-Hellman
2.
Key Derivation Function
3.
Authenticated Encryption with Associated Data
4.
Key Encapsulation Mechanism
5.
The X3DH Protocol
6.
The PermDraws Tactic
7.
The PQXDH Protocol
8.
Security Definitions
7.
Β
The PQXDH Protocol
β
6.5. Scope
8. Security Definitions
β
7.Β The PQXDH Protocol
π
This section is under revision.
β
6.5. Scope
8. Security Definitions
β