The following pages link to (Q4234051):
Displaying 50 items.
- Towards secure quantum key distribution protocol for wireless LANs: a hybrid approach (Q264872) (← links)
- Participant attack on three-party quantum key agreement with two-photon entanglement (Q267227) (← links)
- Blake-Wilson, Johnson \& Menezes protocol revisited (Q350869) (← links)
- Efficient arbitrated quantum signature and its proof of security (Q356871) (← links)
- Round-optimal password-based authenticated key exchange (Q380962) (← links)
- Two-server password-only authenticated key exchange (Q414937) (← links)
- Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal (Q488261) (← links)
- Multi-attacker protocol validation (Q540676) (← links)
- Bounds and constructions for unconditionally secure distributed key distribution schemes for general access structures (Q596095) (← links)
- Provably secure and efficient identification and key agreement protocol with user anonymity (Q716313) (← links)
- Security weakness in a three-party pairing-based protocol for password authenticated key exchange (Q865906) (← links)
- An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices (Q884001) (← links)
- FORSAKES: a forward-secure authenticated key exchange protocol based on symmetric key-evolving schemes (Q895004) (← links)
- Improving the security of protocols of quantum key agreement solely using Bell states and Bell measurement (Q898471) (← links)
- Cryptanalysis of simple three-party key exchange protocol (S-3PAKE) (Q931089) (← links)
- Two-factor mutual authentication based on smart cards and passwords (Q955348) (← links)
- Simple password-based three-party authenticated key exchange without server public keys (Q975863) (← links)
- A calculus for cryptographic protocols: The spi calculus (Q1283776) (← links)
- Short variable length domain extenders with beyond birthday bound security (Q1633453) (← links)
- On the leakage-resilient key exchange (Q1684049) (← links)
- State separation for code-based game-playing proofs (Q1710673) (← links)
- A ramp model for distributed key distribution schemes (Q1811091) (← links)
- Standard model leakage-resilient authenticated key exchange using inner-product extractors (Q2119952) (← links)
- An efficient eCK secure identity based two party authenticated key agreement scheme with security against active adversaries (Q2216128) (← links)
- The TLS handshake protocol: A modular analysis (Q2267369) (← links)
- Strongly secure identity-based authenticated key agreement protocols without bilinear pairings (Q2282019) (← links)
- Strengthening the security of authenticated key exchange against bad randomness (Q2413007) (← links)
- The meeting businessmen problem: requirements and limitations (Q2443007) (← links)
- Security weaknesses of a signature scheme and authenticated key agreement protocols (Q2445398) (← links)
- Resource-aware protocols for authenticated group key exchange in integrated wired and wireless networks (Q2456502) (← links)
- Transducer-based analysis of cryptographic protocols (Q2464141) (← links)
- Three weaknesses in a simple three-party key exchange protocol (Q2465974) (← links)
- Modular proofs for key exchange: rigorous optimizations in the Canetti-Krawczyk model (Q2502168) (← links)
- On \(\tau\)-time secure key agreement (Q2515458) (← links)
- The GN-authenticated key agreement (Q2572038) (← links)
- Hardware security without secure hardware: how to decrypt with a password and a server (Q2664944) (← links)
- One-Round Attribute-Based Key Exchange in the Multi-party Setting (Q2953862) (← links)
- Ideal Key Derivation and Encryption in Simulation-Based Security (Q3073705) (← links)
- On the Minimum Communication Effort for Secure Group Key Exchange (Q3084264) (← links)
- Analysis of the SSH Key Exchange Protocol (Q3104707) (← links)
- On Forward Secrecy in One-Round Key Exchange (Q3104714) (← links)
- Доказательство защищенности протокола обмена ключами (Q3381855) (← links)
- A Universally Composable Group Key Exchange Protocol with Minimum Communication Effort (Q3540059) (← links)
- Authentication Revisited: Flaw or Not, the Recursive Authentication Protocol (Q3540086) (← links)
- An Efficient Password Authenticated Key Exchange Protocol with Bilinear Parings (Q3558782) (← links)
- Provably Secure N-Party Authenticated Key Exchange in the Multicast DPWA Setting (Q3600323) (← links)
- A Modular Security Analysis of the TLS Handshake Protocol (Q3600365) (← links)
- Comparison-Based Key Exchange and the Security of the Numeric Comparison Mode in Bluetooth v2.1 (Q3623036) (← links)
- Security Analysis of Standard Authentication and Key Agreement Protocols Utilising Timestamps (Q3637143) (← links)
- Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness (Q3637144) (← links)