Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Modular Security Proofs for Key Agreement Protocols - MaRDI portal

Modular Security Proofs for Key Agreement Protocols

From MaRDI portal
Publication:5451090

DOI10.1007/11593447_30zbMath1154.94464OpenAlexW1481626015MaRDI QIDQ5451090

Caroline Kudla, Kenneth G. Paterson

Publication date: 18 March 2008

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/11593447_30




Related Items (25)

Participant attack on three-party quantum key agreement with two-photon entanglementPerfect forward secure identity-based authenticated key agreement protocol in the escrow modeBlake-Wilson, Johnson \& Menezes protocol revisitedProvably secure and efficient certificateless authenticated tripartite key agreement protocolA strengthened eCK secure identity based authenticated key agreement protocol based on the standard CDH assumptionImproving the security of protocols of quantum key agreement solely using Bell states and Bell measurementProvably secure one-round identity-based authenticated asymmetric group key agreement protocolA formal security analysis of the Signal messaging protocolAn efficient eCK secure identity based two party authenticated key agreement scheme with security against active adversariesA mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocolsIdentity-based authenticated key agreement protocol based on Weil pairingThe TLS handshake protocol: A modular analysisAutomating Computational Proofs for Public-Key-Based Key ExchangeSimulatable certificateless two-party authenticated key agreement protocolA Modular Security Analysis of the TLS Handshake ProtocolA pairing-free identity-based authenticated key agreement protocol with minimal message exchangesNonce-Based Key Agreement Protocol Against Bad RandomnessThe Twin Diffie-Hellman Problem and ApplicationsAn improved identity-based key agreement protocol and its security proofAsymmetric Group Key AgreementДоказательство защищенности протокола обмена ключамиTightly-secure authenticated key exchange, revisitedStrongly Secure Certificateless Key AgreementAnalysis of the SSH Key Exchange ProtocolThe twin Diffie-Hellman problem and applications




This page was built for publication: Modular Security Proofs for Key Agreement Protocols