scientific article
From MaRDI portal
Publication:3149675
zbMath1010.94555MaRDI QIDQ3149675
Rafail Ostrovsky, Jonathan N. Katz, Mordechai M. Yung
Publication date: 30 September 2002
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items
Efficient set intersection with simulation-based security ⋮ Efficient Password-Authenticated Key Exchange from RLWE Based on Asymmetric Key Consensus ⋮ PAKEs: New Framework, New Techniques and More Efficient Lattice-Based Constructions in the Standard Model ⋮ Password-based group key agreement protocol for client-server application ⋮ Multiparty Proximity Testing with Dishonest Majority from Equality Testing ⋮ EC2C-PAKA: an efficient client-to-client password-authenticated key agreement ⋮ Modular approach to the design and analysis of password-based security protocols ⋮ Decision procedures for the security of protocols with probabilistic encryption against offline dictionary attacks ⋮ Verifier-based anonymous password-authenticated key exchange protocol in the standard model ⋮ Security weakness in a three-party pairing-based protocol for password authenticated key exchange ⋮ A New Client-to-Client Password-Authenticated Key Agreement Protocol ⋮ A new framework for deniable secure key exchange ⋮ Wireless-channel key exchange ⋮ A universally composable PAKE with zero communication cost. (And why it shouldn't be considered UC-secure) ⋮ Structure-Preserving Smooth Projective Hashing ⋮ EKE meets tight security in the universally composable framework ⋮ Auditable asymmetric password authenticated public key establishment ⋮ Fuzzy asymmetric password-authenticated key exchange ⋮ Provably Secure Password Authenticated Key Exchange Based on RLWE for the Post-Quantum World ⋮ Secure identification and QKD in the bounded-quantum-storage model ⋮ Resource-aware protocols for authenticated group key exchange in integrated wired and wireless networks ⋮ A rational framework for secure communication ⋮ Composition of password-based protocols ⋮ Simpler session-key generation from short random passwords ⋮ Uniqueness of \(DP\)-Nash subgraphs and \(D\)-sets in weighted graphs of Netflix games ⋮ Provably Secure N-Party Authenticated Key Exchange in the Multicast DPWA Setting ⋮ Faster and Shorter Password-Authenticated Key Exchange ⋮ Provably secure threshold password-authenticated key exchange ⋮ Contributory Password-Authenticated Group Key Exchange with Join Capability ⋮ Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework ⋮ Password-authenticated group key establishment from smooth projective hash functions ⋮ Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness ⋮ Delayed-Key Message Authentication for Streams ⋮ Universally composable relaxed password authenticated key exchange ⋮ Practical post-quantum password-authenticated key exchange based-on module-lattice
This page was built for publication: