%PDF-1.5 % 4 0 obj << /S /GoTo /D (chapter.1) >> endobj 7 0 obj (On the Provable Security of the Dragonfly Protocol) endobj 8 0 obj << /S /GoTo /D (section.1.1) >> endobj 11 0 obj (Introduction) endobj 12 0 obj << /S /GoTo /D (section.1.2) >> endobj 15 0 obj (Security Model) endobj 16 0 obj << /S /GoTo /D (subsection.1.2.1) >> endobj 19 0 obj (Model) endobj 20 0 obj << /S /GoTo /D (subsection.1.2.2) >> endobj 23 0 obj (Security Assumptions) endobj 24 0 obj << /S /GoTo /D (section.1.3) >> endobj 27 0 obj (The Dragonfly Protocol) endobj 28 0 obj << /S /GoTo /D (section.1.4) >> endobj 31 0 obj (Security proof of Dragonfly protocol) endobj 32 0 obj << /S /GoTo /D (section.1.5) >> endobj 35 0 obj (Conclusion) endobj 36 0 obj << /S /GoTo /D (section*.16) >> endobj 39 0 obj (Acknowledgments.) endobj 40 0 obj << /S /GoTo /D (section.A.1) >> endobj 43 0 obj (The original Dragonfly protocol) endobj 44 0 obj << /S /GoTo /D [45 0 R /Fit] >> endobj 77 0 obj << /Length 3135 /Filter /FlateDecode >> stream xڭZIw8W=M\4ig^ϛ%Z ?PWCo_O||[zQ"dH eY&H+=dFsdߟeW7~`Ժkpv}š\Rqȯ}JQfq,i(52,2)j+ێQS3QҋE0Nh,E^0xg .n`vdO?Q^/)oY}UUH_njmggEMHM^H}>9](/E Piq/mzw-&}?-Nk~7k{rzq <;N,&AOaG>DWLߒrD<=+J"Gd)ܷh8m4&8B%ܣA-uߋW4e8D^*#Wm_}'.,{E[LNMj7q6'x~A_U٩@K*P{pxR^;gXߗ lTv0)gƅx ~ [걓z~F8ƺ x]