Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article - MaRDI portal

scientific article

From MaRDI portal
Publication:3149675

zbMath1010.94555MaRDI QIDQ3149675

Rafail Ostrovsky, Jonathan N. Katz, Mordechai M. Yung

Publication date: 30 September 2002


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items

Efficient set intersection with simulation-based securityEfficient Password-Authenticated Key Exchange from RLWE Based on Asymmetric Key ConsensusPAKEs: New Framework, New Techniques and More Efficient Lattice-Based Constructions in the Standard ModelPassword-based group key agreement protocol for client-server applicationMultiparty Proximity Testing with Dishonest Majority from Equality TestingEC2C-PAKA: an efficient client-to-client password-authenticated key agreementModular approach to the design and analysis of password-based security protocolsDecision procedures for the security of protocols with probabilistic encryption against offline dictionary attacksVerifier-based anonymous password-authenticated key exchange protocol in the standard modelSecurity weakness in a three-party pairing-based protocol for password authenticated key exchangeA New Client-to-Client Password-Authenticated Key Agreement ProtocolA new framework for deniable secure key exchangeWireless-channel key exchangeA universally composable PAKE with zero communication cost. (And why it shouldn't be considered UC-secure)Structure-Preserving Smooth Projective HashingEKE meets tight security in the universally composable frameworkAuditable asymmetric password authenticated public key establishmentFuzzy asymmetric password-authenticated key exchangeProvably Secure Password Authenticated Key Exchange Based on RLWE for the Post-Quantum WorldSecure identification and QKD in the bounded-quantum-storage modelResource-aware protocols for authenticated group key exchange in integrated wired and wireless networksA rational framework for secure communicationComposition of password-based protocolsSimpler session-key generation from short random passwordsUniqueness of \(DP\)-Nash subgraphs and \(D\)-sets in weighted graphs of Netflix gamesProvably Secure N-Party Authenticated Key Exchange in the Multicast DPWA SettingFaster and Shorter Password-Authenticated Key ExchangeProvably secure threshold password-authenticated key exchangeContributory Password-Authenticated Group Key Exchange with Join CapabilityEfficient Two-Party Password-Based Key Exchange Protocols in the UC FrameworkPassword-authenticated group key establishment from smooth projective hash functionsPassword-Authenticated Group Key Agreement with Adaptive Security and ContributivenessDelayed-Key Message Authentication for StreamsUniversally composable relaxed password authenticated key exchangePractical post-quantum password-authenticated key exchange based-on module-lattice




This page was built for publication: