scientific article; zbMATH DE number 2086716

From MaRDI portal
Revision as of 21:56, 7 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:4737255

zbMath1056.94511MaRDI QIDQ4737255

Ran Canetti, Hugo Krawczyk

Publication date: 11 August 2004

Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2332/23320337.htm

Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (41)

A probabilistic polynomial-time process calculus for the analysis of cryptographic protocolsUniversally composable secure positioning in the bounded retrieval modelHidden shift quantum cryptanalysis and implicationsCiphertext verification security of symmetric encryption schemesUsing IND-CVA for constructing secure communicationUniversally composable anonymous hash certification modelA unified and composable take on ratchetingWireless-channel key exchangeSender-binding key encapsulationStructure-Preserving Smooth Projective HashingPassword-authenticated TLS via OPAQUE and post-handshake authenticationFORSAKES: a forward-secure authenticated key exchange protocol based on symmetric key-evolving schemesKey-schedule security for the TLS 1.3 standardKey encapsulation mechanism with tight enhanced security in the multi-user setting: impossibility result and optimal tightnessThe IITM model: a simple and expressive model for universal composabilitySimulatable channels: extended security that is universally composable and easier to proveA Universally Composable Group Key Exchange Protocol with Minimum Communication EffortResource-aware protocols for authenticated group key exchange in integrated wired and wireless networksKey Establishment Using Signcryption TechniquesThe reactive simulatability (RSIM) framework for asynchronous systemsA full proof of the BGW protocol for perfectly secure multiparty computationUnifying simulatability definitions in cryptographic systems under different timing assumptionsThe TLS handshake protocol: A modular analysisWeakening the perfect encryption assumption in Dolev-Yao adversariesAutomating Computational Proofs for Public-Key-Based Key ExchangeA Modular Security Analysis of the TLS Handshake ProtocolPrivate set-intersection with common set-upIdeal Key Derivation and Encryption in Simulation-Based SecurityKey Insulation and Intrusion Resilience over a Public ChannelOn the relationships between notions of simulation-based securitySecurity Analysis of Standard Authentication and Key Agreement Protocols Utilising TimestampsUniversally Composable Private Proximity TestingAnalysis of the SSH Key Exchange ProtocolOn Forward Secrecy in One-Round Key ExchangeA Universally Composable Framework for the Analysis of Browser-Based Security ProtocolsUniversally Composable Security Analysis of TLSUnilaterally-Authenticated Key ExchangeOvercoming impossibility results in composable security using interval-wise guaranteesLimits of the BRSIM/UC Soundness of Dolev-Yao Models with HashesInitiator-Resilient Universally Composable Key ExchangeResource-restricted cryptography: revisiting MPC bounds in the proof-of-work era







This page was built for publication: