Authenticated Key Exchange and Key Encapsulation in the Standard Model
From MaRDI portal
Publication:3498394
DOI10.1007/978-3-540-76900-2_29zbMath1153.94458OpenAlexW1515609811MaRDI QIDQ3498394
Publication date: 15 May 2008
Published in: Advances in Cryptology – ASIACRYPT 2007 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-76900-2_29
Related Items
Tight chosen ciphertext attack (CCA)-secure hybrid encryption scheme with full public verifiability ⋮ Sponge Based CCA2 Secure Asymmetric Encryption for Arbitrary Length Message ⋮ A note on the strong authenticated key exchange with auxiliary inputs ⋮ Round-optimal password-based authenticated key exchange ⋮ Modular Design of Role-Symmetric Authenticated Key Exchange Protocols ⋮ Efficient One-Round Key Exchange in the Standard Model ⋮ Provably secure three-party password-based authenticated key exchange protocol ⋮ CMQV+: an authenticated key exchange protocol from CMQV ⋮ Security weaknesses of a signature scheme and authenticated key agreement protocols ⋮ Strongly secure authenticated key exchange from factoring, codes, and lattices ⋮ Improved efficiency of Kiltz07-KEM ⋮ Designing Efficient Authenticated Key Exchange Resilient to Leakage of Ephemeral Secret Keys ⋮ Taxonomical Security Consideration of Authenticated Key Exchange Resilient to Intermediate Computation Leakage ⋮ Characterization of Strongly Secure Authenticated Key Exchanges without NAXOS Technique ⋮ Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman Protocols ⋮ Strongly leakage resilient authenticated key exchange, revisited
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS
- An efficient protocol for authenticated key agreement
- Stronger Security of Authenticated Key Exchange
- A Pseudorandom Generator from any One-way Function
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- Advances in Cryptology – CRYPTO 2004
- Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM
- Another look at HMQV
- HMQV: A High-Performance Secure Diffie-Hellman Protocol