Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article; zbMATH DE number 1024060 - MaRDI portal

scientific article; zbMATH DE number 1024060

From MaRDI portal
Publication:4341751

zbMath0870.94019MaRDI QIDQ4341751

Mihir Bellare, Phillip Rogaway

Publication date: 24 September 1997


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (only showing first 100 items - show all)

Another Look at TightnessFlexible Authenticated and Confidential Channel Establishment (fACCE): Analyzing the Noise Protocol FrameworkMany a Mickle Makes a Muckle: A Framework for Provably Quantum-Secure Hybrid Key ExchangeAnonymous Communication and Anonymous CashFast Discretized Gaussian Sampling and Post-quantum TLS CiphersuiteContinuous After-the-Fact Leakage-Resilient eCK-Secure Key ExchangeModelling Ciphersuite and Version Negotiation in the TLS ProtocolMethodology for assessing the security of cryptographic protocolsSymmetric Key Exchange with Full Forward Security and Robust SynchronizationModular Design of Role-Symmetric Authenticated Key Exchange ProtocolsA strengthened eCK secure identity based authenticated key agreement protocol based on the standard CDH assumptionMulti-user CDH problems and the concrete security of \(\mathsf{NAXOS}\) and \(\mathsf{X3DH}\)Wireless-channel key exchangeOne-Round Attribute-Based Key Exchange in the Multi-party SettingAlmost tight multi-user security under adaptive corruptions \& leakages in the standard modelLattice-based signatures with tight adaptive corruptions and moreA provably secure, lightweight protocol for anonymous authenticationKey-schedule security for the TLS 1.3 standardPrivacy-preserving authenticated key exchange in the standard modelRandom oracle combiners: breaking the concatenation barrier for collision-resistanceOn optimal tightness for key exchange with full forward secrecy via key confirmationCryptographic analysis of the Bluetooth secure connection protocol suiteEnforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin PolicyA Critical Analysis and Improvement of AACS Drive-Host AuthenticationPost-quantum asynchronous deniable key exchange and the signal handshakeLifting standard model reductions to common setup assumptionsPost-quantum insecurity from LWELattice-based authenticated key exchange with tight securityAlmost tight multi-user security under adaptive corruptions from LWE in the standard modelOne-Round Attribute-Based Key Exchange in the Multi-Party SettingProvably Secure Password Authenticated Key Exchange Based on RLWE for the Post-Quantum WorldUnnamed ItemOne-Round Cross-Domain Group Key Exchange Protocol in the Standard ModelA Universally Composable Group Key Exchange Protocol with Minimum Communication EffortAuthenticated Group Key Agreement Protocol Without PairingKey Establishment Using Signcryption TechniquesGroup Key Establishment in a Quantum-Future ScenarioNon-Interactive Key Exchangefficient and Provably Secure Generic Construction of Client-to-Client Password-Based Key Exchange ProtocolThe security of the cipher block chaining message authentication codeA Modular Security Analysis of EAP and IEEE 802.11Automating Computational Proofs for Public-Key-Based Key ExchangeProvably Secure N-Party Authenticated Key Exchange in the Multicast DPWA SettingA Modular Security Analysis of the TLS Handshake ProtocolOAEP Is Secure under Key-Dependent MessagesSAS-Based Group Authentication and Key Agreement ProtocolsFaster and Shorter Password-Authenticated Key ExchangeOn the Connection Between Signcryption and One-Pass Key EstablishmentAuthenticated Key Exchange with Entities from Different Settings and Varied GroupsDesigning Efficient Authenticated Key Exchange Resilient to Leakage of Ephemeral Secret KeysStronger Difficulty Notions for Client Puzzles and Denial-of-Service-Resistant ProtocolsEfficient Two-Party Password-Based Key Exchange Protocols in the UC FrameworkComparison-Based Key Exchange and the Security of the Numeric Comparison Mode in Bluetooth v2.1Key Insulation and Intrusion Resilience over a Public ChannelОбзор уязвимостей некоторых протоколов выработки общего ключа с аутентификацией на основе пароля и принципы построения протокола SESPAKEДоказательство защищенности протокола обмена ключамиOn the Minimum Communication Effort for Secure Group Key ExchangeTowards Denial-of-Service-Resilient Key Agreement ProtocolsSecurity Analysis of Standard Authentication and Key Agreement Protocols Utilising TimestampsPassword-Authenticated Group Key Agreement with Adaptive Security and ContributivenessTaxonomical Security Consideration of Authenticated Key Exchange Resilient to Intermediate Computation LeakageCharacterization of Strongly Secure Authenticated Key Exchanges without NAXOS TechniqueConcurrent Non-Malleable Commitments (and More) in 3 RoundsA New Spin on Quantum Cryptography: Avoiding Trapdoors and Embracing Public KeysAnalysis of the SSH Key Exchange ProtocolOn Forward Secrecy in One-Round Key ExchangeTowards a Provably Secure DoS-Resilient Key Exchange Protocol with Perfect Forward SecrecyComparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman ProtocolsConcrete Security for Entity Recognition: The Jane Doe ProtocolA Universally Composable Framework for the Analysis of Browser-Based Security ProtocolsUnilaterally-Authenticated Key ExchangeProtocol Composition Logic (PCL)Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos0-RTT Key Exchange with Full Forward SecrecyStandard model leakage-resilient authenticated key exchange using inner-product extractorsLattice-based key exchange on small integer solution problemSigned Diffie-Hellman key exchange with tight securityMoSS: modular security specifications frameworkProvable security analysis of FIDO2An efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniableDoes Fiat-Shamir require a cryptographic hash function?Authenticated key exchange and signatures with tight security in the standard modelImproved attacks against key reuse in learning with errors key exchangeMore efficient post-quantum KEMTLS with pre-distributed public keysPerfect forward secure identity-based authenticated key agreement protocol in the escrow modeMultipath TLS 1.3EC2C-PAKA: an efficient client-to-client password-authenticated key agreementFormal analysis of Kerberos 5A formal language for cryptographic protocol requirementsBlake-Wilson, Johnson \& Menezes protocol revisitedID-based authenticated group key agreement from bilinear mapsSecurity weakness in a three-party pairing-based protocol for password authenticated key exchangeAn efficient certificateless two-party authenticated key agreement protocolZero round-trip time for the extended access control protocolStrong authenticated key exchange with auxiliary inputsOn the (In)security of Kilian-based SNARGsRound-optimal password-based authenticated key exchangeSignal-flow-based analysis of wireless security protocolsAn efficient identity-based key exchange protocol with KGS forward secrecy for low-power devicesStrengthening the security of authenticated key exchange against bad randomness




This page was built for publication: