The following pages link to (Q4341751):
Displaying 50 items.
- Blake-Wilson, Johnson \& Menezes protocol revisited (Q350869) (← links)
- ID-based authenticated group key agreement from bilinear maps (Q352009) (← links)
- An efficient certificateless two-party authenticated key agreement protocol (Q356085) (← links)
- Round-optimal password-based authenticated key exchange (Q380962) (← links)
- Signal-flow-based analysis of wireless security protocols (Q385716) (← links)
- An improved two-party identity-based authenticated key agreement protocol using pairings (Q414861) (← links)
- Two-server password-only authenticated key exchange (Q414937) (← links)
- Provably secure three-party password-based authenticated key exchange protocol (Q425526) (← links)
- A round-optimal three-party ID-based authenticated key agreement protocol (Q425537) (← links)
- Provably secure one-round identity-based authenticated asymmetric group key agreement protocol (Q433086) (← links)
- CMQV+: an authenticated key exchange protocol from CMQV (Q439860) (← links)
- An ID-based three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments (Q458506) (← links)
- Timed encryption with application to deniable key exchange (Q477191) (← links)
- Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal (Q488261) (← links)
- Cryptanalysis of a chaotic map-based password-authenticated key agreement protocol using smart cards (Q493916) (← links)
- Strongly secure authenticated key exchange from factoring, codes, and lattices (Q494585) (← links)
- Provably secure three party encrypted key exchange scheme with explicit authentication (Q497145) (← links)
- A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols (Q507654) (← links)
- Certificateless one-pass and two-party authenticated key agreement protocol and its extensions (Q508905) (← links)
- A computational interpretation of Dolev-Yao adversaries (Q557888) (← links)
- Weakening the perfect encryption assumption in Dolev-Yao adversaries (Q557896) (← links)
- Provably secure identity-based authenticated key agreement protocols with malicious private key generators (Q621645) (← links)
- An efficient dynamic authenticated key exchange protocol with selectable identities (Q639064) (← links)
- On the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groups (Q735025) (← links)
- Signed Diffie-Hellman key exchange with tight security (Q826255) (← links)
- Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode (Q848272) (← links)
- Formal analysis of Kerberos 5 (Q860899) (← links)
- Security weakness in a three-party pairing-based protocol for password authenticated key exchange (Q865906) (← links)
- An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices (Q884001) (← links)
- On security analysis of an after-the-fact leakage resilient key exchange protocol (Q888956) (← links)
- FORSAKES: a forward-secure authenticated key exchange protocol based on symmetric key-evolving schemes (Q895004) (← links)
- Improving the security of protocols of quantum key agreement solely using Bell states and Bell measurement (Q898471) (← links)
- Cryptanalysis of simple three-party key exchange protocol (S-3PAKE) (Q931089) (← links)
- An improved identity-based key agreement protocol and its security proof (Q1007846) (← links)
- A secure and scalable group key exchange system (Q1041738) (← links)
- Lattice-based key exchange on small integer solution problem (Q1616180) (← links)
- On the leakage-resilient key exchange (Q1684049) (← links)
- Authenticated confidential channel establishment and the security of TLS-DHE (Q1698403) (← links)
- A Markov adversary model to detect vulnerable iOS devices and vulnerabilities in iOS apps (Q1737189) (← links)
- Leighton-Micali hash-based signatures in the quantum random-oracle model (Q1746971) (← links)
- A formal language for cryptographic protocol requirements (Q1910421) (← links)
- Anonymity and one-way authentication in key exchange protocols (Q1943977) (← links)
- A cryptographic analysis of the TLS 1.3 handshake protocol (Q1983332) (← links)
- A simple provably secure AKE from the LWE problem (Q1992397) (← links)
- Towards isogeny-based password-authenticated key establishment (Q2027265) (← links)
- Introduction to the special issue on TLS 1.3 (Q2043319) (← links)
- Secure communication channel establishment: TLS 1.3 (over TCP Fast Open) versus QUIC (Q2043323) (← links)
- On the tight security of TLS 1.3: theoretically sound cryptographic parameters for real-world deployments (Q2044755) (← links)
- Certificateless two-party authenticated key agreement scheme for smart grid (Q2053888) (← links)
- Generic authenticated key exchange in the quantum random oracle model (Q2055699) (← links)