The following pages link to NAXOS (Q15583):
Displaying 50 items.
- Blake-Wilson, Johnson \& Menezes protocol revisited (Q350869) (← links)
- An efficient certificateless two-party authenticated key agreement protocol (Q356085) (← links)
- Provably secure three-party password-based authenticated key exchange protocol (Q425526) (← links)
- CMQV+: an authenticated key exchange protocol from CMQV (Q439860) (← links)
- Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal (Q488261) (← links)
- Strongly secure authenticated key exchange from factoring, codes, and lattices (Q494585) (← links)
- A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols (Q507654) (← links)
- Analysis and improvement of an authenticated multiple key exchange protocol (Q553824) (← links)
- Strongly secure identity-based authenticated key agreement protocols (Q553832) (← links)
- An efficient authenticated key exchange from random self-reducibility on CSIDH (Q831632) (← links)
- Towards post-quantum security for signal's X3DH handshake (Q832361) (← links)
- Practical isogeny-based key-exchange with optimal tightness (Q832367) (← links)
- On security analysis of an after-the-fact leakage resilient key exchange protocol (Q888956) (← links)
- FORSAKES: a forward-secure authenticated key exchange protocol based on symmetric key-evolving schemes (Q895004) (← links)
- Securing group key exchange against strong corruptions and key registration attacks (Q1001678) (← links)
- On the leakage-resilient key exchange (Q1684049) (← links)
- Authenticated confidential channel establishment and the security of TLS-DHE (Q1698403) (← links)
- Anonymity and one-way authentication in key exchange protocols (Q1943977) (← links)
- A cryptographic analysis of the TLS 1.3 handshake protocol (Q1983332) (← links)
- A simple provably secure AKE from the LWE problem (Q1992397) (← links)
- New approach to practical leakage-resilient public-key cryptography (Q2023806) (← links)
- Towards isogeny-based password-authenticated key establishment (Q2027265) (← links)
- Certificateless two-party authenticated key agreement scheme for smart grid (Q2053888) (← links)
- Signed (group) Diffie-Hellman key exchange with tight security (Q2082164) (← links)
- Quantifying the security cost of migrating protocols to practice (Q2096478) (← links)
- Revocable hierarchical identity-based authenticated key exchange (Q2104408) (← links)
- Adaptive-ID secure hierarchical ID-based authenticated key exchange under standard assumptions without random oracles (Q2117023) (← links)
- Tighter proofs for the SIGMA and TLS 1.3 key exchange protocols (Q2117066) (← links)
- Standard model leakage-resilient authenticated key exchange using inner-product extractors (Q2119952) (← links)
- An efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniable (Q2135524) (← links)
- Improved attacks against key reuse in learning with errors key exchange (Q2146089) (← links)
- More efficient post-quantum KEMTLS with pre-distributed public keys (Q2146154) (← links)
- A formal security analysis of the Signal messaging protocol (Q2210444) (← links)
- An efficient eCK secure identity based two party authenticated key agreement scheme with security against active adversaries (Q2216128) (← links)
- Strongly secure identity-based authenticated key agreement protocols without bilinear pairings (Q2282019) (← links)
- Strongly leakage resilient authenticated key exchange, revisited (Q2334443) (← links)
- Strong authenticated key exchange with auxiliary inputs (Q2402976) (← links)
- Strengthening the security of authenticated key exchange against bad randomness (Q2413007) (← links)
- A novel pairing-free certificateless authenticated key agreement protocol with provable security (Q2418649) (← links)
- A secure and efficient on-line/off-line group key distribution protocol (Q2420472) (← links)
- Session-StateReveal is stronger than eCKs EphemeralKeyReveal: using automatic analysis to attack the NAXOS protocol (Q2430140) (← links)
- Security weaknesses of a signature scheme and authenticated key agreement protocols (Q2445398) (← links)
- Two-pass authenticated key exchange with explicit authentication and tight security (Q2692405) (← links)
- Security Analysis of the Modular Enhanced Symmetric Role Authentication (mERA) Protocol (Q2803662) (← links)
- Another Look at Tightness (Q2889878) (← links)
- Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices (Q2900236) (← links)
- On the Security of TLS-DHE in the Standard Model (Q2914265) (← links)
- Efficient Public-Key Distance Bounding Protocol (Q2953799) (← links)
- One-Round Attribute-Based Key Exchange in the Multi-party Setting (Q2953862) (← links)
- Strongly Secure Two-Party Certificateless Key Agreement Protocol with Short Message (Q2953863) (← links)