Pages that link to "Item:Q3000545"
From MaRDI portal
The following pages link to Round-Optimal Password-Based Authenticated Key Exchange (Q3000545):
Displaying 25 items.
- An algebraic framework for Diffie-Hellman assumptions (Q514473) (← links)
- Smooth NIZK arguments (Q1629410) (← links)
- Shorter quasi-adaptive NIZK proofs for linear subspaces (Q1698397) (← links)
- Practical witness encryption for algebraic languages or how to encrypt under Groth-Sahai proofs (Q1791668) (← links)
- Uniqueness of \(DP\)-Nash subgraphs and \(D\)-sets in weighted graphs of Netflix games (Q2019479) (← links)
- Universally composable relaxed password authenticated key exchange (Q2096488) (← links)
- A gapless code-based hash proof system based on RQC and its applications (Q2099170) (← links)
- Practical post-quantum password-authenticated key exchange based-on module-lattice (Q2104427) (← links)
- Verifier-based anonymous password-authenticated key exchange protocol in the standard model (Q2160724) (← links)
- Adaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructions (Q2210433) (← links)
- Strong authenticated key exchange with auxiliary inputs (Q2402976) (← links)
- Hardware security without secure hardware: how to decrypt with a password and a server (Q2664944) (← links)
- Subvert KEM to break DEM: practical algorithm-substitution attacks on public-key encryption (Q2692378) (← links)
- Fuzzy asymmetric password-authenticated key exchange (Q2692404) (← links)
- Generic Construction of UC-Secure Oblivious Transfer (Q2794494) (← links)
- One-Round Strong Oblivious Signature-Based Envelope (Q2817800) (← links)
- Adaptive Oblivious Transfer and Generalization (Q2953778) (← links)
- Structure-Preserving Smooth Projective Hashing (Q2953782) (← links)
- Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions (Q2958150) (← links)
- Provably Secure Password Authenticated Key Exchange Based on RLWE for the Post-Quantum World (Q2975804) (← links)
- A New General Framework for Secure Public Key Encryption with Keyword Search (Q3194589) (← links)
- Removing Erasures with Explainable Hash Proof Systems (Q5738786) (← links)
- Fine-grained cryptography revisited (Q5918348) (← links)
- A gapless post-quantum hash proof system in the Hamming metric (Q6535099) (← links)
- Compact password authenticated key exchange from group actions (Q6535486) (← links)