Strongly secure authenticated key exchange from factoring, codes, and lattices (Q494585): Difference between revisions

From MaRDI portal
Changed an Item
ReferenceBot (talk | contribs)
Changed an Item
 
(4 intermediate revisions by 3 users not shown)
Property / describes a project that uses
 
Property / describes a project that uses: McEliece / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: NAXOS / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/s10623-014-9972-2 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2051510359 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Lattice (H)IBE in the Standard Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4228459 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Pseudorandom Functions and Lattices / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4341751 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Wild McEliece / rank
 
Normal rank
Property / cites work
 
Property / cites work: Smaller Decoding Exponents: Ball-Collision Decoding / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - EUROCRYPT 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology – CRYPTO 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Chosen‐Ciphertext Security from Identity‐Based Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4783728 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient One-Round Key Exchange in the Standard Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: One-round key exchange in the standard model / rank
 
Normal rank
Property / cites work
 
Property / cites work: On Forward Secrecy in One-Round Key Exchange / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4542539 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2778861 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Bonsai Trees, or How to Delegate a Lattice Basis / rank
 
Normal rank
Property / cites work
 
Property / cites work: Chosen-Ciphertext Secure RSA-Type Cryptosystems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4249317 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack / rank
 
Normal rank
Property / cites work
 
Property / cites work: Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal / rank
 
Normal rank
Property / cites work
 
Property / cites work: Computational Extractors and Pseudorandomness / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4035738 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A CCA2 Secure Public Key Encryption Scheme Based on the McEliece Assumptions in the Standard Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Making the Diffie-Hellman Protocol Identity-Based / rank
 
Normal rank
Property / cites work
 
Property / cites work: Ephemeral Key Leakage Resilient and Efficient ID-AKEs That Can Share Identities, Private and Master Keys / rank
 
Normal rank
Property / cites work
 
Property / cites work: Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead / rank
 
Normal rank
Property / cites work
 
Property / cites work: Generic One Round Group Key Exchange in the Standard Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Practical Chosen Ciphertext Secure Encryption from Factoring / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Group of Signed Quadratic Residues and Applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Applied Cryptography and Network Security / rank
 
Normal rank
Property / cites work
 
Property / cites work: Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman / rank
 
Normal rank
Property / cites work
 
Property / cites work: Adaptive Trapdoor Functions and Chosen-Ciphertext Security / rank
 
Normal rank
Property / cites work
 
Property / cites work: HMQV: A High-Performance Secure Diffie-Hellman Protocol / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptographic Extraction and Key Derivation: The HKDF Scheme / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology – CRYPTO 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Stronger Security of Authenticated Key Exchange / rank
 
Normal rank
Property / cites work
 
Property / cites work: Generalized Compact Knapsacks Are Collision Resistant / rank
 
Normal rank
Property / cites work
 
Property / cites work: On Ideal Lattices and Learning with Errors over Rings / rank
 
Normal rank
Property / cites work
 
Property / cites work: Chosen Ciphertext Secure Encryption under Factoring Assumption Revisited / rank
 
Normal rank
Property / cites work
 
Property / cites work: Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller / rank
 
Normal rank
Property / cites work
 
Property / cites work: Worst‐Case to Average‐Case Reductions Based on Gaussian Measures / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - CRYPTO 2003 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Semantic security for the McEliece cryptosystem without random oracles / rank
 
Normal rank
Property / cites work
 
Property / cites work: Authenticated Key Exchange and Key Encapsulation in the Standard Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public-key cryptosystems from the worst-case shortest vector problem / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Lossy trapdoor functions and their applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: On lattices, learning with errors, random linear codes, and cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: A New Security Model for Authenticated Key Agreement / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Public Key Encryption Based on Ideal Lattices / rank
 
Normal rank
Property / cites work
 
Property / cites work: One-Round Authenticated Key Exchange with Strong Forward Secrecy in the Standard Model against Constrained Adversary / rank
 
Normal rank

Latest revision as of 17:42, 10 July 2024

scientific article
Language Label Description Also known as
English
Strongly secure authenticated key exchange from factoring, codes, and lattices
scientific article

    Statements

    Strongly secure authenticated key exchange from factoring, codes, and lattices (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    1 September 2015
    0 references
    0 references
    authenticated key exchange
    0 references
    \(\mathrm {CK}^+\) model
    0 references
    key encapsulation mechanism
    0 references
    identity-based authenticated key exchange
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references