Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article - MaRDI portal

scientific article

From MaRDI portal
Publication:2724434

zbMath0991.94033MaRDI QIDQ2724434

Mihir Bellare, Michel Abdalla, Phillip Rogaway

Publication date: 1 September 2002


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items

Signed Diffie-Hellman key exchange with tight securityOn the Joint Security of Encryption and Signature in EMVMemory-Tight Reductions for Practical Key Encapsulation MechanismsPractical encrypted key agreement using passwordsTowards post-quantum security for signal's X3DH handshakePractical isogeny-based key-exchange with optimal tightnessQuantum lattice enumeration and tweaking discrete pruningImplementing secure reporting of sexual misconduct -- revisiting WhoTooEC2C-PAKA: an efficient client-to-client password-authenticated key agreementInstantiability of RSA-OAEP under chosen-plaintext attackA general compiler for password-authenticated group key exchange protocol in the standard modelOn the leakage-resilient key exchangeSecurity Analysis of CPaceMulti-user CDH problems and the concrete security of \(\mathsf{NAXOS}\) and \(\mathsf{X3DH}\)PFLM: privacy-preserving federated learning with membership proofA more complete analysis of the signal double ratchet algorithmOn tight security proofs for Schnorr signaturesGeneric Constructions of Stateful Public Key Encryption and Their ApplicationsGroup action key encapsulation and non-interactive key exchange in the QROMKey-schedule security for the TLS 1.3 standardStrongly anonymous ratcheted key exchangeCompact and tightly selective-opening secure public-key encryption schemesMemory-tight multi-challenge security of public-key encryptionOn optimal tightness for key exchange with full forward secrecy via key confirmationOn the non-tightness of measurement-based reductions for key encapsulation mechanism in the quantum random oracle modelBatching base oblivious transfersAuthenticated confidential channel establishment and the security of TLS-DHELattice-based authenticated key exchange with tight securityOn elliptic curve $L$-functions integrated encryption schemeImproved security model for public-key authenticated encryption with keyword searchTowards practical key exchange from ordinary isogeny graphsNew technique for chosen-ciphertext security based on non-interactive zero-knowledgeGeneralized public-key cryptography with tight securitySubliminal Hash ChannelsSigncryption Schemes Based on the Diffie–Hellman ProblemHybrid SigncryptionA cryptographic analysis of the TLS 1.3 handshake protocolRobust encryptionNew Constructions and Applications of Trapdoor DDH GroupsCryptanalysis of a communication-efficient three-party password authenticated key exchange protocolSimple password-based three-party authenticated key exchange without server public keysThe Kurosawa-Desmedt key encapsulation is not chosen-ciphertext secureConstant-Round Password-Based Authenticated Key Exchange Protocol for Dynamic GroupsStrongly secure identity-based authenticated key agreement protocols without bilinear pairingsGeneric constructions of integrated PKE and PEKSThe Twin Diffie-Hellman Problem and ApplicationsOn Shortening Ciphertexts: New Constructions for Compact Public Key and Stateful Encryption SchemesSecure communication channel establishment: TLS 1.3 (over TCP Fast Open) versus QUICOn the tight security of TLS 1.3: theoretically sound cryptographic parameters for real-world deploymentsEverybody's a target: scalability in public-key encryptionAnalysing the HPKE standardThe twin Diffie-Hellman problem and applicationsRobust EncryptionSigned (group) Diffie-Hellman key exchange with tight securityHybrid Damgård Is CCA1-Secure under the DDH AssumptionGeneric groups, collision resistance, and ECDSAQuantifying the security cost of migrating protocols to practiceUniversally composable relaxed password authenticated key exchangeA Public-Key Encryption Scheme with Pseudo-random CiphertextsTighter proofs for the SIGMA and TLS 1.3 key exchange protocolsOn the memory-tightness of hashed ElGamalBlind Schnorr signatures and signed ElGamal encryption in the algebraic group model