The following pages link to NAXOS (Q15583):
Displaying 36 items.
- A Generic Variant of NIST’s KAS2 Key Agreement Protocol (Q3013002) (← links)
- Generic Compilers for Authenticated Key Exchange (Q3058659) (← links)
- Combined Security Analysis of the One- and Three-Pass Unified Model Key Agreement Protocols (Q3058712) (← links)
- Strongly Secure Two-Pass Attribute-Based Authenticated Key Exchange (Q3059648) (← links)
- Ephemeral Key Leakage Resilient and Efficient ID-AKEs That Can Share Identities, Private and Master Keys (Q3059650) (← links)
- Designing Efficient Authenticated Key Exchange Resilient to Leakage of Ephemeral Secret Keys (Q3073703) (← links)
- Stronger Difficulty Notions for Client Puzzles and Denial-of-Service-Resistant Protocols (Q3073713) (← links)
- Batch Computations Revisited: Combining Key Computations and Batch Verifications (Q3084250) (← links)
- Taxonomical Security Consideration of Authenticated Key Exchange Resilient to Intermediate Computation Leakage (Q3092372) (← links)
- TMQV: A Strongly eCK-Secure Diffie-Hellman Protocol without Gap Assumption (Q3092374) (← links)
- Strongly Secure One Round Authenticated Key Exchange Protocol with Perfect Forward Security (Q3092375) (← links)
- Characterization of Strongly Secure Authenticated Key Exchanges without NAXOS Technique (Q3097996) (← links)
- A New Spin on Quantum Cryptography: Avoiding Trapdoors and Embracing Public Keys (Q3102797) (← links)
- On Forward Secrecy in One-Round Key Exchange (Q3104714) (← links)
- Strongly Secure Certificateless Key Agreement (Q3392914) (← links)
- Continuous After-the-Fact Leakage-Resilient eCK-Secure Key Exchange (Q3460112) (← links)
- Authenticated Key Exchange and Key Encapsulation in the Standard Model (Q3498394) (← links)
- Stronger Security of Authenticated Key Exchange (Q3503867) (← links)
- Flexible Group Key Exchange with On-demand Computation of Subgroup Keys (Q3558322) (← links)
- Degrees of Security: Protocol Guarantees in the Face of Compromising Adversaries (Q3586028) (← links)
- A New Security Model for Authenticated Key Agreement (Q3588343) (← links)
- Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols (Q3617516) (← links)
- Towards Denial-of-Service-Resilient Key Agreement Protocols (Q3634508) (← links)
- An eCK-Secure Authenticated Key Exchange Protocol without Random Oracles (Q3651588) (← links)
- Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman Protocols (Q3651591) (← links)
- Reusing Static Keys in Key Agreement Protocols (Q3652310) (← links)
- A Study of Two-Party Certificateless Authenticated Key-Agreement Protocols (Q3652311) (← links)
- One-Round Attribute-Based Key Exchange in the Multi-Party Setting (Q4605648) (← links)
- One-Round Authenticated Key Exchange with Strong Forward Secrecy in the Standard Model against Constrained Adversary (Q4912403) (← links)
- A strongly secure identity-based authenticated group key exchange protocol (Q5046475) (← links)
- 0-RTT Key Exchange with Full Forward Secrecy (Q5270373) (← links)
- Secure Cross-Realm Client-to-Client Password-Based Authenticated Key Exchange Against Undetectable On-Line Dictionary Attacks (Q5386103) (← links)
- On the Connection Between Signcryption and One-Pass Key Establishment (Q5448544) (← links)
- Efficient and Strongly Secure Password-Based Server Aided Key Exchange (Extended Abstract) (Q5504621) (← links)
- Leaky Random Oracle (Extended Abstract) (Q5505472) (← links)
- A Modular Security Analysis of EAP and IEEE 802.11 (Q5738761) (← links)