scientific article
From MaRDI portal
Publication:2778861
zbMath0981.94032MaRDI QIDQ2778861
Publication date: 21 March 2002
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2045/20450453
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items (only showing first 100 items - show all)
Standard model leakage-resilient authenticated key exchange using inner-product extractors ⋮ Another Look at Tightness ⋮ An efficient authenticated key exchange from random self-reducibility on CSIDH ⋮ An efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniable ⋮ Quantum lattice enumeration and tweaking discrete pruning ⋮ Hidden shift quantum cryptanalysis and implications ⋮ Authenticated key exchange and signatures with tight security in the standard model ⋮ KHAPE: Asymmetric PAKE from key-hiding key exchange ⋮ Model Checking Security Protocols ⋮ Stand-by Attacks on E-ID Password Authentication ⋮ More efficient post-quantum KEMTLS with pre-distributed public keys ⋮ Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode ⋮ Ciphertext verification security of symmetric encryption schemes ⋮ Using IND-CVA for constructing secure communication ⋮ Multipath TLS 1.3 ⋮ Continuous After-the-Fact Leakage-Resilient eCK-Secure Key Exchange ⋮ A provable privacy-protection system for multi-server environment ⋮ Blake-Wilson, Johnson \& Menezes protocol revisited ⋮ Security weakness in a three-party pairing-based protocol for password authenticated key exchange ⋮ Strong authenticated key exchange with auxiliary inputs ⋮ Long-term security and universal composability ⋮ Signal-flow-based analysis of wireless security protocols ⋮ An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices ⋮ Strengthening the security of authenticated key exchange against bad randomness ⋮ Formal analysis of authentication in 802.11i ⋮ On the leakage-resilient key exchange ⋮ On security analysis of an after-the-fact leakage resilient key exchange protocol ⋮ Authenticated Key Exchange and Key Encapsulation in the Standard Model ⋮ A novel pairing-free certificateless authenticated key agreement protocol with provable security ⋮ One-Round Attribute-Based Key Exchange in the Multi-party Setting ⋮ Security of a Leakage-Resilient Protocol for Key Establishment and Mutual Authentication ⋮ FORSAKES: a forward-secure authenticated key exchange protocol based on symmetric key-evolving schemes ⋮ Efficient One-Round Key Exchange in the Standard Model ⋮ Anonymity and one-way authentication in key exchange protocols ⋮ Authenticated confidential channel establishment and the security of TLS-DHE ⋮ Universally composable symbolic security analysis ⋮ Provably secure three-party password-based authenticated key exchange protocol ⋮ One-Round Attribute-Based Key Exchange in the Multi-Party Setting ⋮ One-round identity-based key exchange with perfect forward security ⋮ CMQV+: an authenticated key exchange protocol from CMQV ⋮ A formal security analysis of the Signal messaging protocol ⋮ Towards practical key exchange from ordinary isogeny graphs ⋮ Simulatable channels: extended security that is universally composable and easier to prove ⋮ An efficient eCK secure identity based two party authenticated key agreement scheme with security against active adversaries ⋮ Security weaknesses of a signature scheme and authenticated key agreement protocols ⋮ A Universally Composable Group Key Exchange Protocol with Minimum Communication Effort ⋮ Design of improved password authentication and update scheme based on elliptic curve cryptography ⋮ Resource-aware protocols for authenticated group key exchange in integrated wired and wireless networks ⋮ Key Establishment Using Signcryption Techniques ⋮ Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal ⋮ Cryptanalysis of a chaotic map-based password-authenticated key agreement protocol using smart cards ⋮ Strongly secure authenticated key exchange from factoring, codes, and lattices ⋮ A cryptographic analysis of the TLS 1.3 handshake protocol ⋮ Certificateless one-pass and two-party authenticated key agreement protocol and its extensions ⋮ A simple provably secure AKE from the LWE problem ⋮ Two-factor mutual authentication based on smart cards and passwords ⋮ Non-Interactive Key Exchange ⋮ Authenticating ad hoc networks by comparison of short digests ⋮ Computationally sound symbolic security reduction analysis of the group key exchange protocols using bilinear pairings ⋮ The TLS handshake protocol: A modular analysis ⋮ Survey on SAP and its application in public-key cryptography ⋮ A Provably Secure One-Pass Two-Party Key Establishment Protocol ⋮ A Modular Security Analysis of the TLS Handshake Protocol ⋮ Modular proofs for key exchange: rigorous optimizations in the Canetti-Krawczyk model ⋮ Private set-intersection with common set-up ⋮ Towards isogeny-based password-authenticated key establishment ⋮ Post-Quantum Forward-Secure Onion Routing ⋮ Strongly secure identity-based authenticated key agreement protocols without bilinear pairings ⋮ On the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groups ⋮ Security Analysis of the Modular Enhanced Symmetric Role Authentication (mERA) Protocol ⋮ Designing Efficient Authenticated Key Exchange Resilient to Leakage of Ephemeral Secret Keys ⋮ Comparison-Based Key Exchange and the Security of the Numeric Comparison Mode in Bluetooth v2.1 ⋮ Key Insulation and Intrusion Resilience over a Public Channel ⋮ Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS ⋮ Доказательство защищенности протокола обмена ключами ⋮ Considering two MAC under SIG variants of the basic SIGMA protocol ⋮ Limonnitsa: making Limonnik-3 post-quantum ⋮ Certificateless two-party authenticated key agreement scheme for smart grid ⋮ Generic authenticated key exchange in the quantum random oracle model ⋮ Privacy-preserving authenticated key exchange and the case of IKEv2 ⋮ Towards Denial-of-Service-Resilient Key Agreement Protocols ⋮ Tightly-secure authenticated key exchange, revisited ⋮ Security Analysis of Standard Authentication and Key Agreement Protocols Utilising Timestamps ⋮ Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness ⋮ Universally Composable Private Proximity Testing ⋮ Taxonomical Security Consideration of Authenticated Key Exchange Resilient to Intermediate Computation Leakage ⋮ TMQV: A Strongly eCK-Secure Diffie-Hellman Protocol without Gap Assumption ⋮ More efficient digital signatures with tight multi-user security ⋮ An efficient and generic construction for Signal's handshake (X3DH): post-quantum, state leakage secure, and deniable ⋮ Characterization of Strongly Secure Authenticated Key Exchanges without NAXOS Technique ⋮ Towards Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies ⋮ A New Spin on Quantum Cryptography: Avoiding Trapdoors and Embracing Public Keys ⋮ Analysis of the SSH Key Exchange Protocol ⋮ On Forward Secrecy in One-Round Key Exchange ⋮ Towards a Provably Secure DoS-Resilient Key Exchange Protocol with Perfect Forward Secrecy ⋮ Efficient Algorithms for Supersingular Isogeny Diffie-Hellman ⋮ Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman Protocols ⋮ Strongly leakage resilient authenticated key exchange, revisited ⋮ Quantifying the security cost of migrating protocols to practice ⋮ Tighter proofs for the SIGMA and TLS 1.3 key exchange protocols
This page was built for publication: