Designing Efficient Authenticated Key Exchange Resilient to Leakage of Ephemeral Secret Keys
From MaRDI portal
Publication:3073703
DOI10.1007/978-3-642-19074-2_10zbMath1284.94137OpenAlexW1480336181MaRDI QIDQ3073703
Atsushi Fujioka, Koutarou Suzuki
Publication date: 11 February 2011
Published in: Topics in Cryptology – CT-RSA 2011 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-19074-2_10
Related Items (2)
Taxonomical Security Consideration of Authenticated Key Exchange Resilient to Intermediate Computation Leakage ⋮ Characterization of Strongly Secure Authenticated Key Exchanges without NAXOS Technique
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS
- Security arguments for digital signatures and blind signatures
- An efficient protocol for authenticated key agreement
- A Secure and Efficient Authenticated Diffie–Hellman Protocol
- Authenticated Key Exchange and Key Encapsulation in the Standard Model
- Stronger Security of Authenticated Key Exchange
- Comparing the Pre- and Post-specified Peer Models for Key Agreement
- An eCK-Secure Authenticated Key Exchange Protocol without Random Oracles
- Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman Protocols
- New directions in cryptography
- Validation of Elliptic Curve Public Keys
- Advances in Cryptology – CRYPTO 2004
- Another look at HMQV
- HMQV: A High-Performance Secure Diffie-Hellman Protocol
- On the Importance of Public-Key Validation in the MQV and HMQV Key Agreement Protocols
- The Twin Diffie-Hellman Problem and Applications
This page was built for publication: Designing Efficient Authenticated Key Exchange Resilient to Leakage of Ephemeral Secret Keys