Characterization of Strongly Secure Authenticated Key Exchanges without NAXOS Technique
From MaRDI portal
Publication:3097996
DOI10.1007/978-3-642-25141-2_3zbMath1344.94082OpenAlexW1842223213MaRDI QIDQ3097996
Publication date: 10 November 2011
Published in: Advances in Information and Computer Security (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-25141-2_3
NAXOS techniquegap Diffie-Hellman assumptionextended Canetti-Krawczyk securitytwo-pass authenticated key exchange
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS
- Security Proofs for Signature Schemes
- A Secure and Efficient Authenticated Diffie–Hellman Protocol
- Designing Efficient Authenticated Key Exchange Resilient to Leakage of Ephemeral Secret Keys
- Authenticated Key Exchange and Key Encapsulation in the Standard Model
- Stronger Security of Authenticated Key Exchange
- An eCK-Secure Authenticated Key Exchange Protocol without Random Oracles
- Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman Protocols
- New directions in cryptography
- Key agreement protocols and their security analysis
- HMQV: A High-Performance Secure Diffie-Hellman Protocol
- The Twin Diffie-Hellman Problem and Applications
This page was built for publication: Characterization of Strongly Secure Authenticated Key Exchanges without NAXOS Technique