One-round key exchange in the standard model
From MaRDI portal
Publication:1017542
DOI10.1504/IJACT.2009.023466zbMath1159.94376OpenAlexW2003758217MaRDI QIDQ1017542
Kenneth G. Paterson, Yvonne Cliff, Juan Manuel González Nieto, Colin A. Boyd
Publication date: 12 May 2009
Published in: International Journal of Applied Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1504/ijact.2009.023466
cryptographystandard modelauthentication protocolskey exchangesecurity analysiskey encapsulation mechanismsKEM
Related Items (9)
Standard model leakage-resilient authenticated key exchange using inner-product extractors ⋮ Improved attacks against key reuse in learning with errors key exchange ⋮ Anonymity of NIST PQC round 3 KEMs ⋮ Modular Design of Role-Symmetric Authenticated Key Exchange Protocols ⋮ Post-quantum anonymity of Kyber ⋮ Post-quantum asynchronous deniable key exchange and the signal handshake ⋮ Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal ⋮ Strongly secure authenticated key exchange from factoring, codes, and lattices ⋮ Authenticated asymmetric group key agreement based on certificateless cryptosystem
Uses Software
This page was built for publication: One-round key exchange in the standard model