scientific article; zbMATH DE number 1024060
From MaRDI portal
Publication:4341751
zbMath0870.94019MaRDI QIDQ4341751
Mihir Bellare, Phillip Rogaway
Publication date: 24 September 1997
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items (only showing first 100 items - show all)
Another Look at Tightness ⋮ Flexible Authenticated and Confidential Channel Establishment (fACCE): Analyzing the Noise Protocol Framework ⋮ Many a Mickle Makes a Muckle: A Framework for Provably Quantum-Secure Hybrid Key Exchange ⋮ Anonymous Communication and Anonymous Cash ⋮ Fast Discretized Gaussian Sampling and Post-quantum TLS Ciphersuite ⋮ Continuous After-the-Fact Leakage-Resilient eCK-Secure Key Exchange ⋮ Modelling Ciphersuite and Version Negotiation in the TLS Protocol ⋮ Methodology for assessing the security of cryptographic protocols ⋮ Symmetric Key Exchange with Full Forward Security and Robust Synchronization ⋮ Modular Design of Role-Symmetric Authenticated Key Exchange Protocols ⋮ A strengthened eCK secure identity based authenticated key agreement protocol based on the standard CDH assumption ⋮ Multi-user CDH problems and the concrete security of \(\mathsf{NAXOS}\) and \(\mathsf{X3DH}\) ⋮ Wireless-channel key exchange ⋮ One-Round Attribute-Based Key Exchange in the Multi-party Setting ⋮ Almost tight multi-user security under adaptive corruptions \& leakages in the standard model ⋮ Lattice-based signatures with tight adaptive corruptions and more ⋮ A provably secure, lightweight protocol for anonymous authentication ⋮ Key-schedule security for the TLS 1.3 standard ⋮ Privacy-preserving authenticated key exchange in the standard model ⋮ Random oracle combiners: breaking the concatenation barrier for collision-resistance ⋮ On optimal tightness for key exchange with full forward secrecy via key confirmation ⋮ Cryptographic analysis of the Bluetooth secure connection protocol suite ⋮ Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy ⋮ A Critical Analysis and Improvement of AACS Drive-Host Authentication ⋮ Post-quantum asynchronous deniable key exchange and the signal handshake ⋮ Lifting standard model reductions to common setup assumptions ⋮ Post-quantum insecurity from LWE ⋮ Lattice-based authenticated key exchange with tight security ⋮ Almost tight multi-user security under adaptive corruptions from LWE in the standard model ⋮ One-Round Attribute-Based Key Exchange in the Multi-Party Setting ⋮ Provably Secure Password Authenticated Key Exchange Based on RLWE for the Post-Quantum World ⋮ Unnamed Item ⋮ One-Round Cross-Domain Group Key Exchange Protocol in the Standard Model ⋮ A Universally Composable Group Key Exchange Protocol with Minimum Communication Effort ⋮ Authenticated Group Key Agreement Protocol Without Pairing ⋮ Key Establishment Using Signcryption Techniques ⋮ Group Key Establishment in a Quantum-Future Scenario ⋮ Non-Interactive Key Exchange ⋮ fficient and Provably Secure Generic Construction of Client-to-Client Password-Based Key Exchange Protocol ⋮ The security of the cipher block chaining message authentication code ⋮ A Modular Security Analysis of EAP and IEEE 802.11 ⋮ Automating Computational Proofs for Public-Key-Based Key Exchange ⋮ Provably Secure N-Party Authenticated Key Exchange in the Multicast DPWA Setting ⋮ A Modular Security Analysis of the TLS Handshake Protocol ⋮ OAEP Is Secure under Key-Dependent Messages ⋮ SAS-Based Group Authentication and Key Agreement Protocols ⋮ Faster and Shorter Password-Authenticated Key Exchange ⋮ On the Connection Between Signcryption and One-Pass Key Establishment ⋮ Authenticated Key Exchange with Entities from Different Settings and Varied Groups ⋮ Designing Efficient Authenticated Key Exchange Resilient to Leakage of Ephemeral Secret Keys ⋮ Stronger Difficulty Notions for Client Puzzles and Denial-of-Service-Resistant Protocols ⋮ Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework ⋮ Comparison-Based Key Exchange and the Security of the Numeric Comparison Mode in Bluetooth v2.1 ⋮ Key Insulation and Intrusion Resilience over a Public Channel ⋮ Обзор уязвимостей некоторых протоколов выработки общего ключа с аутентификацией на основе пароля и принципы построения протокола SESPAKE ⋮ Доказательство защищенности протокола обмена ключами ⋮ On the Minimum Communication Effort for Secure Group Key Exchange ⋮ Towards Denial-of-Service-Resilient Key Agreement Protocols ⋮ Security Analysis of Standard Authentication and Key Agreement Protocols Utilising Timestamps ⋮ Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness ⋮ Taxonomical Security Consideration of Authenticated Key Exchange Resilient to Intermediate Computation Leakage ⋮ Characterization of Strongly Secure Authenticated Key Exchanges without NAXOS Technique ⋮ Concurrent Non-Malleable Commitments (and More) in 3 Rounds ⋮ A New Spin on Quantum Cryptography: Avoiding Trapdoors and Embracing Public Keys ⋮ Analysis of the SSH Key Exchange Protocol ⋮ On Forward Secrecy in One-Round Key Exchange ⋮ Towards a Provably Secure DoS-Resilient Key Exchange Protocol with Perfect Forward Secrecy ⋮ Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman Protocols ⋮ Concrete Security for Entity Recognition: The Jane Doe Protocol ⋮ A Universally Composable Framework for the Analysis of Browser-Based Security Protocols ⋮ Unilaterally-Authenticated Key Exchange ⋮ Protocol Composition Logic (PCL) ⋮ Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos ⋮ 0-RTT Key Exchange with Full Forward Secrecy ⋮ Standard model leakage-resilient authenticated key exchange using inner-product extractors ⋮ Lattice-based key exchange on small integer solution problem ⋮ Signed Diffie-Hellman key exchange with tight security ⋮ MoSS: modular security specifications framework ⋮ Provable security analysis of FIDO2 ⋮ An efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniable ⋮ Does Fiat-Shamir require a cryptographic hash function? ⋮ Authenticated key exchange and signatures with tight security in the standard model ⋮ Improved attacks against key reuse in learning with errors key exchange ⋮ More efficient post-quantum KEMTLS with pre-distributed public keys ⋮ Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode ⋮ Multipath TLS 1.3 ⋮ EC2C-PAKA: an efficient client-to-client password-authenticated key agreement ⋮ Formal analysis of Kerberos 5 ⋮ A formal language for cryptographic protocol requirements ⋮ Blake-Wilson, Johnson \& Menezes protocol revisited ⋮ ID-based authenticated group key agreement from bilinear maps ⋮ Security weakness in a three-party pairing-based protocol for password authenticated key exchange ⋮ An efficient certificateless two-party authenticated key agreement protocol ⋮ Zero round-trip time for the extended access control protocol ⋮ Strong authenticated key exchange with auxiliary inputs ⋮ On the (In)security of Kilian-based SNARGs ⋮ Round-optimal password-based authenticated key exchange ⋮ Signal-flow-based analysis of wireless security protocols ⋮ An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices ⋮ Strengthening the security of authenticated key exchange against bad randomness
This page was built for publication: