Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article - MaRDI portal

scientific article

From MaRDI portal
Publication:3374905

zbMath1082.94533MaRDI QIDQ3374905

Mihir Bellare, David Pointcheval, Phillip Rogaway

Publication date: 1 March 2006


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items

A New Client-to-Client Password-Authenticated Key Agreement Protocol, Methodology for assessing the security of cryptographic protocols, Symmetric Key Exchange with Full Forward Security and Robust Synchronization, Security Analysis of CPace, Modular Design of Role-Symmetric Authenticated Key Exchange Protocols, Wireless-channel key exchange, A universally composable PAKE with zero communication cost. (And why it shouldn't be considered UC-secure), Randomized half-ideal cipher on groups with applications to UC (a)PAKE, EKE meets tight security in the universally composable framework, Password-authenticated key exchange from group actions, Quantum-resistant password-based threshold single-sign-on authentication with updatable server private key, On optimal tightness for key exchange with full forward secrecy via key confirmation, CHIP and CRISP: protecting all parties against compromise through identity-binding PAKEs, Auditable asymmetric password authenticated public key establishment, fficient and Provably Secure Generic Construction of Client-to-Client Password-Based Key Exchange Protocol, A Modular Security Analysis of EAP and IEEE 802.11, SAS-Based Group Authentication and Key Agreement Protocols, Faster and Shorter Password-Authenticated Key Exchange, Authenticated Key Exchange with Entities from Different Settings and Varied Groups, Computationally-Efficient Password Authenticated Key Exchange Based on Quadratic Residues, Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework, New Anonymity Notions for Identity-Based Encryption, New Anonymity Notions for Identity-Based Encryption, Efficient and Strongly Secure Password-Based Server Aided Key Exchange (Extended Abstract), Security analysis of a password-based authentication protocol proposed to IEEE 1363, How to build an ideal cipher: the indifferentiability of the Feistel construction, Efficient Password-Authenticated Key Exchange from RLWE Based on Asymmetric Key Consensus, PAKEs: New Framework, New Techniques and More Efficient Lattice-Based Constructions in the Standard Model, Provable security analysis of FIDO2, Practical encrypted key agreement using passwords, Password-based group key agreement protocol for client-server application, Smooth NIZK arguments, Short variable length domain extenders with beyond birthday bound security, KHAPE: Asymmetric PAKE from key-hiding key exchange, UC-secure and Contributory Password-Authenticated Group Key Exchange, Multipath TLS 1.3, EC2C-PAKA: an efficient client-to-client password-authenticated key agreement, Provably secure extended chaotic map-based three-party key agreement protocols using password authentication, Decision procedures for the security of protocols with probabilistic encryption against offline dictionary attacks, Verifier-based anonymous password-authenticated key exchange protocol in the standard model, Blake-Wilson, Johnson \& Menezes protocol revisited, Security weakness in a three-party pairing-based protocol for password authenticated key exchange, A chaotic maps-based authenticated key agreement protocol with strong anonymity, Asymmetric PAKE with low computation \textit{and} communication, Hardware security without secure hardware: how to decrypt with a password and a server, Round-optimal password-based authenticated key exchange, Signal-flow-based analysis of wireless security protocols, Strengthening the security of authenticated key exchange against bad randomness, Structure-Preserving Smooth Projective Hashing, One-Round Attribute-Based Key Exchange in the Multi-party Setting, Simple and efficient password-based authenticated key exchange protocol, Security of a Leakage-Resilient Protocol for Key Establishment and Mutual Authentication, FORSAKES: a forward-secure authenticated key exchange protocol based on symmetric key-evolving schemes, Traceable Privacy of Recent Provably-Secure RFID Protocols, Improving the security of protocols of quantum key agreement solely using Bell states and Bell measurement, Two-server password-only authenticated key exchange, Anonymity and one-way authentication in key exchange protocols, Authenticated confidential channel establishment and the security of TLS-DHE, Provably secure three-party password-based authenticated key exchange protocol, Public-key generation with verifiable randomness, Fuzzy asymmetric password-authenticated key exchange, One-Round Attribute-Based Key Exchange in the Multi-Party Setting, Provably secure one-round identity-based authenticated asymmetric group key agreement protocol, Password Mistyping in Two-Factor-Authenticated Key Exchange, On weaknesses of the HDCP authentication and key exchange protocol and its repair, Provably Secure Password Authenticated Key Exchange Based on RLWE for the Post-Quantum World, A formal security analysis of the Signal messaging protocol, State separation for code-based game-playing proofs, An ID-based three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments, A Universally Composable Group Key Exchange Protocol with Minimum Communication Effort, Cryptanalysis of simple three-party key exchange protocol (S-3PAKE), Resource-aware protocols for authenticated group key exchange in integrated wired and wireless networks, How not to create an isogeny-based PAKE, Key Establishment Using Signcryption Techniques, Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal, A Markov adversary model to detect vulnerable iOS devices and vulnerabilities in iOS apps, Cryptanalysis of a chaotic map-based password-authenticated key agreement protocol using smart cards, A rational framework for secure communication, Three weaknesses in a simple three-party key exchange protocol, An Efficient Password Authenticated Key Exchange Protocol with Bilinear Parings, A simple provably secure AKE from the LWE problem, Two-factor mutual authentication based on smart cards and passwords, Non-Interactive Key Exchange, Simpler session-key generation from short random passwords, Authenticating ad hoc networks by comparison of short digests, Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol, Simple authenticated key agreement and protected password change protocol, Weakness in a RSA-based password authenticated key exchange protocol, Simple password-based three-party authenticated key exchange without server public keys, The TLS handshake protocol: A modular analysis, Automating Computational Proofs for Public-Key-Based Key Exchange, Simulatable certificateless two-party authenticated key agreement protocol, Provably Secure N-Party Authenticated Key Exchange in the Multicast DPWA Setting, A Modular Security Analysis of the TLS Handshake Protocol, Modular proofs for key exchange: rigorous optimizations in the Canetti-Krawczyk model, Constant-Round Password-Based Authenticated Key Exchange Protocol for Dynamic Groups, A general compiler for password-authenticated group key exchange protocol, Towards isogeny-based password-authenticated key establishment, Pitfalls in a server-aided authenticated group key establishment, Provably secure threshold password-authenticated key exchange, Strongly secure identity-based authenticated key agreement protocols without bilinear pairings, Contributory Password-Authenticated Group Key Exchange with Join Capability, Ideal Key Derivation and Encryption in Simulation-Based Security, Comparison-Based Key Exchange and the Security of the Numeric Comparison Mode in Bluetooth v2.1, Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS, Password-authenticated group key establishment from smooth projective hash functions, Обзор уязвимостей некоторых протоколов выработки общего ключа с аутентификацией на основе пароля и принципы построения протокола SESPAKE, Доказательство защищенности протокола обмена ключами, On the Minimum Communication Effort for Secure Group Key Exchange, Security Analysis of Standard Authentication and Key Agreement Protocols Utilising Timestamps, Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness, Gateway-Oriented Password-Authenticated Key Exchange Protocol with Stronger Security, Security Analysis of the PACE Key-Agreement Protocol, Analysis of the SSH Key Exchange Protocol, On Forward Secrecy in One-Round Key Exchange, Delayed-Key Message Authentication for Streams, Password authenticated key exchange and protected password change protocols, Off-line password-guessing attacks on the generalized key agreement and password authentication protocol, Quantifying the security cost of migrating protocols to practice, Universally composable relaxed password authenticated key exchange, A gapless code-based hash proof system based on RQC and its applications, Practical post-quantum password-authenticated key exchange based-on module-lattice, Tighter proofs for the SIGMA and TLS 1.3 key exchange protocols, The ``Quantum annoying property of password-authenticated key exchange protocols