On security analysis of an after-the-fact leakage resilient key exchange protocol
From MaRDI portal
Publication:888956
DOI10.1016/J.IPL.2015.08.006zbMath1343.94084OpenAlexW1677497858MaRDI QIDQ888956
Publication date: 5 November 2015
Published in: Information Processing Letters (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ipl.2015.08.006
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Cryptanalysis of simple three-party key exchange protocol (S-3PAKE)
- Cryptanalysis of a Provably Secure Cross-Realm Client-to-Client Password-Authenticated Key Agreement Protocol of CANS ’09
- Efficient eCK-Secure Authenticated Key Exchange Protocols in the Standard Model
- Security Improvement on a Group Key Exchange Protocol for Mobile Networks
- Stronger Security of Authenticated Key Exchange
- Continuous After-the-Fact Leakage-Resilient Key Exchange
- HMQV: A High-Performance Secure Diffie-Hellman Protocol
- Errors in Computational Complexity Proofs for Protocols
This page was built for publication: On security analysis of an after-the-fact leakage resilient key exchange protocol