Security Analysis of CPace
From MaRDI portal
Publication:6045079
DOI10.1007/978-3-030-92068-5_24zbMath1514.94027OpenAlexW4205916842MaRDI QIDQ6045079
Björn Haase, Julia Hesse, Michel Abdalla
Publication date: 26 May 2023
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-030-92068-5_24
Related Items (4)
Wireless-channel key exchange ⋮ A universally composable PAKE with zero communication cost. (And why it shouldn't be considered UC-secure) ⋮ EKE meets tight security in the universally composable framework ⋮ CHIP and CRISP: protecting all parties against compromise through identity-binding PAKEs
Cites Work
- Unnamed Item
- Unnamed Item
- OPAQUE: an asymmetric PAKE protocol secure against pre-computation attacks
- Universally composable relaxed password authenticated key exchange
- Separating symmetric and asymmetric password-authenticated key exchange
- The ``Quantum annoying property of password-authenticated key exchange protocols
- Security Analysis of the PACE Key-Agreement Protocol
- Decaf: Eliminating Cofactors Through Point Compression
- Efficient Indifferentiable Hashing into Ordinary Elliptic Curves
- Universally Composable Password-Based Key Exchange
- Separating succinct non-interactive arguments from all falsifiable assumptions
- Advances in Cryptology - CRYPTO 2003
- Topics in Cryptology – CT-RSA 2005
- Public Key Cryptography - PKC 2006
- Algorithmic Number Theory
This page was built for publication: Security Analysis of CPace