Pages that link to "Item:Q3503867"
From MaRDI portal
The following pages link to Stronger Security of Authenticated Key Exchange (Q3503867):
Displayed 33 items.
- Stronger Difficulty Notions for Client Puzzles and Denial-of-Service-Resistant Protocols (Q3073713) (← links)
- Batch Computations Revisited: Combining Key Computations and Batch Verifications (Q3084250) (← links)
- Taxonomical Security Consideration of Authenticated Key Exchange Resilient to Intermediate Computation Leakage (Q3092372) (← links)
- TMQV: A Strongly eCK-Secure Diffie-Hellman Protocol without Gap Assumption (Q3092374) (← links)
- Strongly Secure One Round Authenticated Key Exchange Protocol with Perfect Forward Security (Q3092375) (← links)
- Characterization of Strongly Secure Authenticated Key Exchanges without NAXOS Technique (Q3097996) (← links)
- A New Spin on Quantum Cryptography: Avoiding Trapdoors and Embracing Public Keys (Q3102797) (← links)
- On Forward Secrecy in One-Round Key Exchange (Q3104714) (← links)
- Strongly Secure Certificateless Key Agreement (Q3392914) (← links)
- Stand-by Attacks on E-ID Password Authentication (Q3454602) (← links)
- Continuous After-the-Fact Leakage-Resilient eCK-Secure Key Exchange (Q3460112) (← links)
- Authenticated Key Exchange and Key Encapsulation in the Standard Model (Q3498394) (← links)
- Efficient One-Round Key Exchange in the Standard Model (Q3511152) (← links)
- Identity-based authenticated key agreement protocol based on Weil pairing (Q3577932) (← links)
- Towards Denial-of-Service-Resilient Key Agreement Protocols (Q3634508) (← links)
- Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman Protocols (Q3651591) (← links)
- One-Round Attribute-Based Key Exchange in the Multi-Party Setting (Q4605648) (← links)
- Methodology for assessing the security of cryptographic protocols (Q5089858) (← links)
- Authenticated Key Exchange with Entities from Different Settings and Varied Groups (Q5200589) (← links)
- 0-RTT Key Exchange with Full Forward Secrecy (Q5270373) (← links)
- Efficient and Strongly Secure Password-Based Server Aided Key Exchange (Extended Abstract) (Q5504621) (← links)
- Leaky Random Oracle (Extended Abstract) (Q5505472) (← links)
- A Modular Security Analysis of EAP and IEEE 802.11 (Q5738761) (← links)
- Unilaterally-Authenticated Key Exchange (Q5854443) (← links)
- Modular Design of Role-Symmetric Authenticated Key Exchange Protocols (Q6045080) (← links)
- A strengthened eCK secure identity based authenticated key agreement protocol based on the standard CDH assumption (Q6053404) (← links)
- Multi-user CDH problems and the concrete security of \(\mathsf{NAXOS}\) and \(\mathsf{X3DH}\) (Q6057198) (← links)
- On optimal tightness for key exchange with full forward secrecy via key confirmation (Q6149609) (← links)
- Key encapsulation mechanism with tight enhanced security in the multi-user setting: impossibility result and optimal tightness (Q6157528) (← links)
- Post-quantum asynchronous deniable key exchange and the signal handshake (Q6169026) (← links)
- Post-quantum anonymous one-sided authenticated key exchange without random oracles (Q6169027) (← links)
- Lattice-based authenticated key exchange with tight security (Q6190151) (← links)
- Almost tight multi-user security under adaptive corruptions from LWE in the standard model (Q6190153) (← links)