Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article; zbMATH DE number 1775427 - MaRDI portal

scientific article; zbMATH DE number 1775427

From MaRDI portal
Publication:4542560

zbMath1028.68015MaRDI QIDQ4542560

Hugo Krawczyk, Mihir Bellare, Ran Canetti

Publication date: 1 August 2002


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items

Participant attack on three-party quantum key agreement with two-photon entanglement, Lattice-based key exchange on small integer solution problem, MoSS: modular security specifications framework, Improved attacks against key reuse in learning with errors key exchange, Modular approach to the design and analysis of password-based security protocols, Strong authenticated key exchange with auxiliary inputs, An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices, A new framework for deniable secure key exchange, Open problems in hash function security, One-Round Attribute-Based Key Exchange in the Multi-party Setting, FORSAKES: a forward-secure authenticated key exchange protocol based on symmetric key-evolving schemes, A Lightweight Key Agreement Protocol with Authentication Capability, Improving the security of protocols of quantum key agreement solely using Bell states and Bell measurement, Efficient One-Round Key Exchange in the Standard Model, One-Round Attribute-Based Key Exchange in the Multi-Party Setting, Provably secure one-round identity-based authenticated asymmetric group key agreement protocol, CMQV+: an authenticated key exchange protocol from CMQV, A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks, A formal security analysis of the Signal messaging protocol, The meeting businessmen problem: requirements and limitations, Security weaknesses of a signature scheme and authenticated key agreement protocols, Cryptography and cryptographic protocols, Timed encryption with application to deniable key exchange, Key Establishment Using Signcryption Techniques, The reactive simulatability (RSIM) framework for asynchronous systems, Two-factor mutual authentication based on smart cards and passwords, Authenticating ad hoc networks by comparison of short digests, Unifying simulatability definitions in cryptographic systems under different timing assumptions, Distributed temporal logic for the analysis of security protocol models, The TLS handshake protocol: A modular analysis, A Modular Security Analysis of the TLS Handshake Protocol, Modular proofs for key exchange: rigorous optimizations in the Canetti-Krawczyk model, Private set-intersection with common set-up, On the Connection Between Signcryption and One-Pass Key Establishment, On the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groups, A new approach for UC security concurrent deniable authentication, A non-interactive deniable authentication scheme based on designated verifier proofs, Asymmetric Group Key Agreement, Password-authenticated group key establishment from smooth projective hash functions, Generic authenticated key exchange in the quantum random oracle model, Security Analysis of Standard Authentication and Key Agreement Protocols Utilising Timestamps, Analysis of the SSH Key Exchange Protocol, On Forward Secrecy in One-Round Key Exchange, New approaches for deniable authentication, Strongly leakage resilient authenticated key exchange, revisited, Unilaterally-Authenticated Key Exchange, Authenticated asymmetric group key agreement based on certificateless cryptosystem, Initiator-Resilient Universally Composable Key Exchange