Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article - MaRDI portal

scientific article

From MaRDI portal
Publication:2778861

zbMath0981.94032MaRDI QIDQ2778861

Ran Canetti, Hugo Krawczyk

Publication date: 21 March 2002

Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2045/20450453

Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (only showing first 100 items - show all)

Standard model leakage-resilient authenticated key exchange using inner-product extractorsAnother Look at TightnessAn efficient authenticated key exchange from random self-reducibility on CSIDHAn efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniableQuantum lattice enumeration and tweaking discrete pruningHidden shift quantum cryptanalysis and implicationsAuthenticated key exchange and signatures with tight security in the standard modelKHAPE: Asymmetric PAKE from key-hiding key exchangeModel Checking Security ProtocolsStand-by Attacks on E-ID Password AuthenticationMore efficient post-quantum KEMTLS with pre-distributed public keysPerfect forward secure identity-based authenticated key agreement protocol in the escrow modeCiphertext verification security of symmetric encryption schemesUsing IND-CVA for constructing secure communicationMultipath TLS 1.3Continuous After-the-Fact Leakage-Resilient eCK-Secure Key ExchangeA provable privacy-protection system for multi-server environmentBlake-Wilson, Johnson \& Menezes protocol revisitedSecurity weakness in a three-party pairing-based protocol for password authenticated key exchangeStrong authenticated key exchange with auxiliary inputsLong-term security and universal composabilitySignal-flow-based analysis of wireless security protocolsAn efficient identity-based key exchange protocol with KGS forward secrecy for low-power devicesStrengthening the security of authenticated key exchange against bad randomnessFormal analysis of authentication in 802.11iOn the leakage-resilient key exchangeOn security analysis of an after-the-fact leakage resilient key exchange protocolAuthenticated Key Exchange and Key Encapsulation in the Standard ModelA novel pairing-free certificateless authenticated key agreement protocol with provable securityOne-Round Attribute-Based Key Exchange in the Multi-party SettingSecurity of a Leakage-Resilient Protocol for Key Establishment and Mutual AuthenticationFORSAKES: a forward-secure authenticated key exchange protocol based on symmetric key-evolving schemesEfficient One-Round Key Exchange in the Standard ModelAnonymity and one-way authentication in key exchange protocolsAuthenticated confidential channel establishment and the security of TLS-DHEUniversally composable symbolic security analysisProvably secure three-party password-based authenticated key exchange protocolOne-Round Attribute-Based Key Exchange in the Multi-Party SettingOne-round identity-based key exchange with perfect forward securityCMQV+: an authenticated key exchange protocol from CMQVA formal security analysis of the Signal messaging protocolTowards practical key exchange from ordinary isogeny graphsSimulatable channels: extended security that is universally composable and easier to proveAn efficient eCK secure identity based two party authenticated key agreement scheme with security against active adversariesSecurity weaknesses of a signature scheme and authenticated key agreement protocolsA Universally Composable Group Key Exchange Protocol with Minimum Communication EffortDesign of improved password authentication and update scheme based on elliptic curve cryptographyResource-aware protocols for authenticated group key exchange in integrated wired and wireless networksKey Establishment Using Signcryption TechniquesBeyond eCK: perfect forward secrecy under actor compromise and ephemeral-key revealCryptanalysis of a chaotic map-based password-authenticated key agreement protocol using smart cardsStrongly secure authenticated key exchange from factoring, codes, and latticesA cryptographic analysis of the TLS 1.3 handshake protocolCertificateless one-pass and two-party authenticated key agreement protocol and its extensionsA simple provably secure AKE from the LWE problemTwo-factor mutual authentication based on smart cards and passwordsNon-Interactive Key ExchangeAuthenticating ad hoc networks by comparison of short digestsComputationally sound symbolic security reduction analysis of the group key exchange protocols using bilinear pairingsThe TLS handshake protocol: A modular analysisSurvey on SAP and its application in public-key cryptographyA Provably Secure One-Pass Two-Party Key Establishment ProtocolA Modular Security Analysis of the TLS Handshake ProtocolModular proofs for key exchange: rigorous optimizations in the Canetti-Krawczyk modelPrivate set-intersection with common set-upTowards isogeny-based password-authenticated key establishmentPost-Quantum Forward-Secure Onion RoutingStrongly secure identity-based authenticated key agreement protocols without bilinear pairingsOn the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groupsSecurity Analysis of the Modular Enhanced Symmetric Role Authentication (mERA) ProtocolDesigning Efficient Authenticated Key Exchange Resilient to Leakage of Ephemeral Secret KeysComparison-Based Key Exchange and the Security of the Numeric Comparison Mode in Bluetooth v2.1Key Insulation and Intrusion Resilience over a Public ChannelObtaining a secure and efficient key agreement protocol from (H)MQV and NAXOSДоказательство защищенности протокола обмена ключамиConsidering two MAC under SIG variants of the basic SIGMA protocolLimonnitsa: making Limonnik-3 post-quantumCertificateless two-party authenticated key agreement scheme for smart gridGeneric authenticated key exchange in the quantum random oracle modelPrivacy-preserving authenticated key exchange and the case of IKEv2Towards Denial-of-Service-Resilient Key Agreement ProtocolsTightly-secure authenticated key exchange, revisitedSecurity Analysis of Standard Authentication and Key Agreement Protocols Utilising TimestampsPassword-Authenticated Group Key Agreement with Adaptive Security and ContributivenessUniversally Composable Private Proximity TestingTaxonomical Security Consideration of Authenticated Key Exchange Resilient to Intermediate Computation LeakageTMQV: A Strongly eCK-Secure Diffie-Hellman Protocol without Gap AssumptionMore efficient digital signatures with tight multi-user securityAn efficient and generic construction for Signal's handshake (X3DH): post-quantum, state leakage secure, and deniableCharacterization of Strongly Secure Authenticated Key Exchanges without NAXOS TechniqueTowards Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve IsogeniesA New Spin on Quantum Cryptography: Avoiding Trapdoors and Embracing Public KeysAnalysis of the SSH Key Exchange ProtocolOn Forward Secrecy in One-Round Key ExchangeTowards a Provably Secure DoS-Resilient Key Exchange Protocol with Perfect Forward SecrecyEfficient Algorithms for Supersingular Isogeny Diffie-HellmanComparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman ProtocolsStrongly leakage resilient authenticated key exchange, revisitedQuantifying the security cost of migrating protocols to practiceTighter proofs for the SIGMA and TLS 1.3 key exchange protocols




This page was built for publication: