Further analysis of the Internet Key Exchange protocol. Computer Communications 23(17), 1606 – 1612 (2000) A Adversary models In this section we briefly describe the adversary models considered in this analysis as listed in Table 5. Their formal definitio (0)

by J Zhou
Venue:in AF, for CK, and as in AFC, for CKw). Second, the adversary can reveal the local state (e. g., the random numbers) generated in other sessions. eCK-1 and eCK-2 The eCK-1 and eCK-2 models together model the eCK adversary model (Extended CK). The eCK mode