scientific article
From MaRDI portal
Publication:2724434
zbMath0991.94033MaRDI QIDQ2724434
Mihir Bellare, Michel Abdalla, Phillip Rogaway
Publication date: 1 September 2002
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
securityelliptic curve cryptosystemsgeneric modelDiffie-Hellman key exchangeEl-Gamal encryptioncryptographic standardDHIESDiffie-Hellman integrated encryption scheme
Related Items
Signed Diffie-Hellman key exchange with tight security ⋮ On the Joint Security of Encryption and Signature in EMV ⋮ Memory-Tight Reductions for Practical Key Encapsulation Mechanisms ⋮ Practical encrypted key agreement using passwords ⋮ Towards post-quantum security for signal's X3DH handshake ⋮ Practical isogeny-based key-exchange with optimal tightness ⋮ Quantum lattice enumeration and tweaking discrete pruning ⋮ Implementing secure reporting of sexual misconduct -- revisiting WhoToo ⋮ EC2C-PAKA: an efficient client-to-client password-authenticated key agreement ⋮ Instantiability of RSA-OAEP under chosen-plaintext attack ⋮ A general compiler for password-authenticated group key exchange protocol in the standard model ⋮ On the leakage-resilient key exchange ⋮ Security Analysis of CPace ⋮ Multi-user CDH problems and the concrete security of \(\mathsf{NAXOS}\) and \(\mathsf{X3DH}\) ⋮ PFLM: privacy-preserving federated learning with membership proof ⋮ A more complete analysis of the signal double ratchet algorithm ⋮ On tight security proofs for Schnorr signatures ⋮ Generic Constructions of Stateful Public Key Encryption and Their Applications ⋮ Group action key encapsulation and non-interactive key exchange in the QROM ⋮ Key-schedule security for the TLS 1.3 standard ⋮ Strongly anonymous ratcheted key exchange ⋮ Compact and tightly selective-opening secure public-key encryption schemes ⋮ Memory-tight multi-challenge security of public-key encryption ⋮ On optimal tightness for key exchange with full forward secrecy via key confirmation ⋮ On the non-tightness of measurement-based reductions for key encapsulation mechanism in the quantum random oracle model ⋮ Batching base oblivious transfers ⋮ Authenticated confidential channel establishment and the security of TLS-DHE ⋮ Lattice-based authenticated key exchange with tight security ⋮ On elliptic curve $L$-functions integrated encryption scheme ⋮ Improved security model for public-key authenticated encryption with keyword search ⋮ Towards practical key exchange from ordinary isogeny graphs ⋮ New technique for chosen-ciphertext security based on non-interactive zero-knowledge ⋮ Generalized public-key cryptography with tight security ⋮ Subliminal Hash Channels ⋮ Signcryption Schemes Based on the Diffie–Hellman Problem ⋮ Hybrid Signcryption ⋮ A cryptographic analysis of the TLS 1.3 handshake protocol ⋮ Robust encryption ⋮ New Constructions and Applications of Trapdoor DDH Groups ⋮ Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol ⋮ Simple password-based three-party authenticated key exchange without server public keys ⋮ The Kurosawa-Desmedt key encapsulation is not chosen-ciphertext secure ⋮ Constant-Round Password-Based Authenticated Key Exchange Protocol for Dynamic Groups ⋮ Strongly secure identity-based authenticated key agreement protocols without bilinear pairings ⋮ Generic constructions of integrated PKE and PEKS ⋮ The Twin Diffie-Hellman Problem and Applications ⋮ On Shortening Ciphertexts: New Constructions for Compact Public Key and Stateful Encryption Schemes ⋮ Secure communication channel establishment: TLS 1.3 (over TCP Fast Open) versus QUIC ⋮ On the tight security of TLS 1.3: theoretically sound cryptographic parameters for real-world deployments ⋮ Everybody's a target: scalability in public-key encryption ⋮ Analysing the HPKE standard ⋮ The twin Diffie-Hellman problem and applications ⋮ Robust Encryption ⋮ Signed (group) Diffie-Hellman key exchange with tight security ⋮ Hybrid Damgård Is CCA1-Secure under the DDH Assumption ⋮ Generic groups, collision resistance, and ECDSA ⋮ Quantifying the security cost of migrating protocols to practice ⋮ Universally composable relaxed password authenticated key exchange ⋮ A Public-Key Encryption Scheme with Pseudo-random Ciphertexts ⋮ Tighter proofs for the SIGMA and TLS 1.3 key exchange protocols ⋮ On the memory-tightness of hashed ElGamal ⋮ Blind Schnorr signatures and signed ElGamal encryption in the algebraic group model