Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Cryptographic Extraction and Key Derivation: The HKDF Scheme - MaRDI portal

Cryptographic Extraction and Key Derivation: The HKDF Scheme

From MaRDI portal
Publication:3582781

DOI10.1007/978-3-642-14623-7_34zbMath1283.94072OpenAlexW2164090669MaRDI QIDQ3582781

Hugo Krawczyk

Publication date: 24 August 2010

Published in: Advances in Cryptology – CRYPTO 2010 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-14623-7_34




Related Items (35)

Oblivious TLS via multi-party computationMany a Mickle Makes a Muckle: A Framework for Provably Quantum-Secure Hybrid Key ExchangeCondensed UnpredictabilityQuantum algorithms for the \(k\)-XOR problemPrivacy with Imperfect RandomnessMore efficient post-quantum KEMTLS with pre-distributed public keysMultipath TLS 1.3Partition oracles from weak key forgeriesО повышении безопасности схем подписи Эль-ГамаляOn the concrete security of TLS 1.3 PSK modeHardware security without secure hardware: how to decrypt with a password and a serverConnecting tweakable and multi-key blockcipher securityPassword-authenticated TLS via OPAQUE and post-handshake authenticationEfficient and Provable White-Box PrimitivesPuncturable key wrapping and its applicationsWOTSwana: a generalized \(\mathcal{S}_{\mathrm{ leeve }}\) construction for multiple proofs of ownershipKey-schedule security for the TLS 1.3 standardWhen messages are keys: is HMAC a dual-PRF?Security reductions for white-box key-storage in mobile paymentsA formal security analysis of the Signal messaging protocolSimple and more efficient PRFs with tight security from LWE and matrix-DDHComputational fuzzy extractorsStrongly secure authenticated key exchange from factoring, codes, and latticesA cryptographic analysis of the TLS 1.3 handshake protocolA joint Shannon cipher and privacy amplification approach to attaining exponentially decaying information leakagePost-Quantum Forward-Secure Onion RoutingReusable fuzzy extractors for low-entropy distributionsA unified approach to deterministic encryption: new constructions and a connection to computational entropySession resumption protocols and efficient forward security for TLS 1.3 0-RTTDynamic Searchable Symmetric Encryption with Minimal Leakage and Efficient Updates on Commodity HardwareOn the tight security of TLS 1.3: theoretically sound cryptographic parameters for real-world deploymentsKEMTLS with delayed forward identity protection in (almost) a single round tripRevocable hierarchical identity-based authenticated key exchangeIQRA: Incremental Quadratic Re-keying friendly Authentication schemeTighter proofs for the SIGMA and TLS 1.3 key exchange protocols


Uses Software



This page was built for publication: Cryptographic Extraction and Key Derivation: The HKDF Scheme