The following pages link to HMQV (Q15253):
Displaying 50 items.
- Blake-Wilson, Johnson \& Menezes protocol revisited (Q350869) (← links)
- CMQV+: an authenticated key exchange protocol from CMQV (Q439860) (← links)
- Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal (Q488261) (← links)
- Cryptanalysis of a chaotic map-based password-authenticated key agreement protocol using smart cards (Q493916) (← links)
- Strongly secure authenticated key exchange from factoring, codes, and lattices (Q494585) (← links)
- A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols (Q507654) (← links)
- Certificateless one-pass and two-party authenticated key agreement protocol and its extensions (Q508905) (← links)
- A security weakness in Abdalla et al.'s generic construction of a group key exchange protocol (Q621633) (← links)
- Certificateless public key encryption: a new generic construction and two pairing-free schemes (Q627164) (← links)
- An efficient authenticated key exchange from random self-reducibility on CSIDH (Q831632) (← links)
- Towards post-quantum security for signal's X3DH handshake (Q832361) (← links)
- Practical isogeny-based key-exchange with optimal tightness (Q832367) (← links)
- Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode (Q848272) (← links)
- On security analysis of an after-the-fact leakage resilient key exchange protocol (Q888956) (← links)
- FORSAKES: a forward-secure authenticated key exchange protocol based on symmetric key-evolving schemes (Q895004) (← links)
- Securing group key exchange against strong corruptions and key registration attacks (Q1001678) (← links)
- An improved identity-based key agreement protocol and its security proof (Q1007846) (← links)
- Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS (Q1008987) (← links)
- One-round key exchange in the standard model (Q1017542) (← links)
- Authenticated confidential channel establishment and the security of TLS-DHE (Q1698403) (← links)
- Preserving privacy for free: efficient and provably secure two-factor authentication scheme with user anonymity (Q1750012) (← links)
- Anonymity and one-way authentication in key exchange protocols (Q1943977) (← links)
- Extended KCI attack against two-party key establishment protocols (Q1944127) (← links)
- A simple provably secure AKE from the LWE problem (Q1992397) (← links)
- Group key exchange protocols from supersingular isogenies (Q2057142) (← links)
- Universally composable relaxed password authenticated key exchange (Q2096488) (← links)
- A key manipulation attack on some recent isogeny-based key agreement protocols (Q2119312) (← links)
- An efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniable (Q2135524) (← links)
- Authenticated key exchange and signatures with tight security in the standard model (Q2139653) (← links)
- KHAPE: Asymmetric PAKE from key-hiding key exchange (Q2139655) (← links)
- Improved attacks against key reuse in learning with errors key exchange (Q2146089) (← links)
- More efficient post-quantum KEMTLS with pre-distributed public keys (Q2146154) (← links)
- Asymmetric PAKE with low computation \textit{and} communication (Q2170042) (← links)
- On the concrete security of TLS 1.3 PSK mode (Q2170074) (← links)
- A formal security analysis of the Signal messaging protocol (Q2210444) (← links)
- Strengthening the security of authenticated key exchange against bad randomness (Q2413007) (← links)
- Session-StateReveal is stronger than eCKs EphemeralKeyReveal: using automatic analysis to attack the NAXOS protocol (Q2430140) (← links)
- On reusing ephemeral keys in Diffie-Hellman key agreement protocols (Q2430145) (← links)
- Resource-aware protocols for authenticated group key exchange in integrated wired and wireless networks (Q2456502) (← links)
- A new framework for deniable secure key exchange (Q2672249) (← links)
- Two-pass authenticated key exchange with explicit authentication and tight security (Q2692405) (← links)
- Security Analysis of the Modular Enhanced Symmetric Role Authentication (mERA) Protocol (Q2803662) (← links)
- The Whole is Less Than the Sum of Its Parts: Constructing More Efficient Lattice-Based AKEs (Q2827724) (← links)
- Another Look at Tightness (Q2889878) (← links)
- Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices (Q2900236) (← links)
- Efficient Public-Key Distance Bounding Protocol (Q2953799) (← links)
- One-Round Attribute-Based Key Exchange in the Multi-party Setting (Q2953862) (← links)
- Provably Secure Password Authenticated Key Exchange Based on RLWE for the Post-Quantum World (Q2975804) (← links)
- Highly-Efficient Universally-Composable Commitments Based on the DDH Assumption (Q3003397) (← links)
- Generic Compilers for Authenticated Key Exchange (Q3058659) (← links)