Cryptographic Extraction and Key Derivation: The HKDF Scheme
From MaRDI portal
Publication:3582781
DOI10.1007/978-3-642-14623-7_34zbMath1283.94072OpenAlexW2164090669MaRDI QIDQ3582781
Publication date: 24 August 2010
Published in: Advances in Cryptology – CRYPTO 2010 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-14623-7_34
Related Items (35)
Oblivious TLS via multi-party computation ⋮ Many a Mickle Makes a Muckle: A Framework for Provably Quantum-Secure Hybrid Key Exchange ⋮ Condensed Unpredictability ⋮ Quantum algorithms for the \(k\)-XOR problem ⋮ Privacy with Imperfect Randomness ⋮ More efficient post-quantum KEMTLS with pre-distributed public keys ⋮ Multipath TLS 1.3 ⋮ Partition oracles from weak key forgeries ⋮ О повышении безопасности схем подписи Эль-Гамаля ⋮ On the concrete security of TLS 1.3 PSK mode ⋮ Hardware security without secure hardware: how to decrypt with a password and a server ⋮ Connecting tweakable and multi-key blockcipher security ⋮ Password-authenticated TLS via OPAQUE and post-handshake authentication ⋮ Efficient and Provable White-Box Primitives ⋮ Puncturable key wrapping and its applications ⋮ WOTSwana: a generalized \(\mathcal{S}_{\mathrm{ leeve }}\) construction for multiple proofs of ownership ⋮ Key-schedule security for the TLS 1.3 standard ⋮ When messages are keys: is HMAC a dual-PRF? ⋮ Security reductions for white-box key-storage in mobile payments ⋮ A formal security analysis of the Signal messaging protocol ⋮ Simple and more efficient PRFs with tight security from LWE and matrix-DDH ⋮ Computational fuzzy extractors ⋮ Strongly secure authenticated key exchange from factoring, codes, and lattices ⋮ A cryptographic analysis of the TLS 1.3 handshake protocol ⋮ A joint Shannon cipher and privacy amplification approach to attaining exponentially decaying information leakage ⋮ Post-Quantum Forward-Secure Onion Routing ⋮ Reusable fuzzy extractors for low-entropy distributions ⋮ A unified approach to deterministic encryption: new constructions and a connection to computational entropy ⋮ Session resumption protocols and efficient forward security for TLS 1.3 0-RTT ⋮ Dynamic Searchable Symmetric Encryption with Minimal Leakage and Efficient Updates on Commodity Hardware ⋮ On the tight security of TLS 1.3: theoretically sound cryptographic parameters for real-world deployments ⋮ KEMTLS with delayed forward identity protection in (almost) a single round trip ⋮ Revocable hierarchical identity-based authenticated key exchange ⋮ IQRA: Incremental Quadratic Re-keying friendly Authentication scheme ⋮ Tighter proofs for the SIGMA and TLS 1.3 key exchange protocols
Uses Software
This page was built for publication: Cryptographic Extraction and Key Derivation: The HKDF Scheme