An efficient protocol for authenticated key agreement

From MaRDI portal
Revision as of 11:42, 1 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:1869822

DOI10.1023/A:1022595222606zbMath1016.94025OpenAlexW1927099252WikidataQ56771132 ScholiaQ56771132MaRDI QIDQ1869822

Laurie Law, Scott A. Vanstone, Minghua Qu, Alfred J. Menezes

Publication date: 28 April 2003

Published in: Designs, Codes and Cryptography (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1023/a:1022595222606




Related Items (40)

A key manipulation attack on some recent isogeny-based key agreement protocolsImproved authenticated multi-key agreement protocolCryptanalysis and design of a three-party authenticated key exchange protocol using smart cardDecaf: Eliminating Cofactors Through Point CompressionImproved attacks against key reuse in learning with errors key exchangeMore efficient post-quantum KEMTLS with pre-distributed public keysCryptanalysis of tripartite and multi-party authenticated key agreement protocolsGuest editorial: Special issue in honor of Scott A. VanstoneAuthenticated Key Exchange and Key Encapsulation in the Standard ModelModular Design of Role-Symmetric Authenticated Key Exchange ProtocolsA strengthened eCK secure identity based authenticated key agreement protocol based on the standard CDH assumptionMulti-user CDH problems and the concrete security of \(\mathsf{NAXOS}\) and \(\mathsf{X3DH}\)Efficient Public-Key Distance Bounding ProtocolFORSAKES: a forward-secure authenticated key exchange protocol based on symmetric key-evolving schemesAn improved two-party identity-based authenticated key agreement protocol using pairingsAnonymity and one-way authentication in key exchange protocolsCMQV+: an authenticated key exchange protocol from CMQVUnnamed ItemAn efficient eCK secure identity based two party authenticated key agreement scheme with security against active adversariesFinding and fixing vulnerabilities in several three-party password authenticated key exchange protocols without server public keysLattice-Based Fault Attacks Against ECMQVModeling energy-efficient secure communications in multi-mode wireless mobile devicesA novel protocol for multiparty quantum key managementО криптографических свойствах алгоритмов, сопутствующих применению стандартов ГОСТ Р 34.11-2012 и ГОСТ Р 34.10-2012A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocolsEfficient identity-based authenticated key agreement protocol from pairingsMulti-party authenticated key agreement protocols from multi-linear formsA Provably Secure One-Pass Two-Party Key Establishment ProtocolAnother look at HMQVDesigning Efficient Authenticated Key Exchange Resilient to Leakage of Ephemeral Secret KeysObtaining a secure and efficient key agreement protocol from (H)MQV and NAXOSBatch Computations Revisited: Combining Key Computations and Batch VerificationsTaxonomical Security Consideration of Authenticated Key Exchange Resilient to Intermediate Computation LeakageStrongly Secure Certificateless Key AgreementThe Whole is Less Than the Sum of Its Parts: Constructing More Efficient Lattice-Based AKEsPreventing Unknown Key-Share Attack using Cryptographic Bilinear MapsComparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman ProtocolsA Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor NetworksThe GN-authenticated key agreementSecurity flaws in authentication and key establishment protocols for mobile communications






This page was built for publication: An efficient protocol for authenticated key agreement