Pages that link to "Item:Q4400561"
From MaRDI portal
The following pages link to Key agreement protocols and their security analysis (Q4400561):
Displaying 50 items.
- Participant attack on three-party quantum key agreement with two-photon entanglement (Q267227) (← links)
- Blake-Wilson, Johnson \& Menezes protocol revisited (Q350869) (← links)
- An improved two-party identity-based authenticated key agreement protocol using pairings (Q414861) (← links)
- A novel protocol for multiparty quantum key management (Q496910) (← links)
- A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols (Q507654) (← links)
- Certificateless one-pass and two-party authenticated key agreement protocol and its extensions (Q508905) (← links)
- Provably secure identity-based authenticated key agreement protocols with malicious private key generators (Q621645) (← links)
- On the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groups (Q735025) (← links)
- Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode (Q848272) (← links)
- FORSAKES: a forward-secure authenticated key exchange protocol based on symmetric key-evolving schemes (Q895004) (← links)
- Improving the security of protocols of quantum key agreement solely using Bell states and Bell measurement (Q898471) (← links)
- A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges (Q991232) (← links)
- An improved identity-based key agreement protocol and its security proof (Q1007846) (← links)
- Authenticated confidential channel establishment and the security of TLS-DHE (Q1698403) (← links)
- Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps (Q1749189) (← links)
- Efficient identity-based authenticated key agreement protocol from pairings (Q1763263) (← links)
- KCI-resilient anonymous wireless link-layer authentication protocols (Q1933901) (← links)
- Anonymity and one-way authentication in key exchange protocols (Q1943977) (← links)
- Security weaknesses of authenticated key agreement protocols (Q1944114) (← links)
- Extended KCI attack against two-party key establishment protocols (Q1944127) (← links)
- Certificateless two-party authenticated key agreement scheme for smart grid (Q2053888) (← links)
- An efficient and generic construction for Signal's handshake (X3DH): post-quantum, state leakage secure, and deniable (Q2061966) (← links)
- Privacy-preserving authenticated key exchange for constrained devices (Q2096615) (← links)
- An efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniable (Q2135524) (← links)
- An efficient eCK secure identity based two party authenticated key agreement scheme with security against active adversaries (Q2216128) (← links)
- The TLS handshake protocol: A modular analysis (Q2267369) (← links)
- Simulatable certificateless two-party authenticated key agreement protocol (Q2269791) (← links)
- EC2C-PAKA: an efficient client-to-client password-authenticated key agreement (Q2384520) (← links)
- Strengthening the security of authenticated key exchange against bad randomness (Q2413007) (← links)
- Connecting tweakable and multi-key blockcipher security (Q2413014) (← links)
- Security weaknesses of a signature scheme and authenticated key agreement protocols (Q2445398) (← links)
- Finding and fixing vulnerabilities in several three-party password authenticated key exchange protocols without server public keys (Q2446462) (← links)
- The GN-authenticated key agreement (Q2572038) (← links)
- Generic groups, collision resistance, and ECDSA (Q2572964) (← links)
- Another Look at Tightness (Q2889878) (← links)
- Characterization of Strongly Secure Authenticated Key Exchanges without NAXOS Technique (Q3097996) (← links)
- Analysis of the SSH Key Exchange Protocol (Q3104707) (← links)
- Доказательство защищенности протокола обмена ключами (Q3381855) (← links)
- A secure MAKAP for wireless communication (Q3443288) (← links)
- Improved authenticated multi-key agreement protocol (Q3443347) (← links)
- A Critical Analysis and Improvement of AACS Drive-Host Authentication (Q3511150) (← links)
- Cryptanalytic Flaws in Oh et al.’s ID-Based Authenticated Key Agreement Protocol (Q3512528) (← links)
- Identity-based authenticated key agreement protocol based on Weil pairing (Q3577932) (← links)
- A Provably Secure One-Pass Two-Party Key Establishment Protocol (Q3600324) (← links)
- A Modular Security Analysis of the TLS Handshake Protocol (Q3600365) (← links)
- Towards Denial-of-Service-Resilient Key Agreement Protocols (Q3634508) (← links)
- Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman Protocols (Q3651591) (← links)
- (Q4536431) (← links)
- (Q4656171) (← links)
- Methodology for assessing the security of cryptographic protocols (Q5089858) (← links)