The following pages link to (Q3374905):
Displayed 50 items.
- How to build an ideal cipher: the indifferentiability of the Feistel construction (Q271585) (← links)
- Provably secure extended chaotic map-based three-party key agreement protocols using password authentication (Q327431) (← links)
- Blake-Wilson, Johnson \& Menezes protocol revisited (Q350869) (← links)
- A chaotic maps-based authenticated key agreement protocol with strong anonymity (Q355005) (← links)
- Round-optimal password-based authenticated key exchange (Q380962) (← links)
- Signal-flow-based analysis of wireless security protocols (Q385716) (← links)
- Simple and efficient password-based authenticated key exchange protocol (Q407442) (← links)
- Two-server password-only authenticated key exchange (Q414937) (← links)
- Provably secure three-party password-based authenticated key exchange protocol (Q425526) (← links)
- Provably secure one-round identity-based authenticated asymmetric group key agreement protocol (Q433086) (← links)
- On weaknesses of the HDCP authentication and key exchange protocol and its repair (Q445345) (← links)
- An ID-based three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments (Q458506) (← links)
- Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal (Q488261) (← links)
- Cryptanalysis of a chaotic map-based password-authenticated key agreement protocol using smart cards (Q493916) (← links)
- A rational framework for secure communication (Q497644) (← links)
- Security analysis of a password-based authentication protocol proposed to IEEE 1363 (Q818140) (← links)
- Decision procedures for the security of protocols with probabilistic encryption against offline dictionary attacks (Q861696) (← links)
- Security weakness in a three-party pairing-based protocol for password authenticated key exchange (Q865906) (← links)
- FORSAKES: a forward-secure authenticated key exchange protocol based on symmetric key-evolving schemes (Q895004) (← links)
- Improving the security of protocols of quantum key agreement solely using Bell states and Bell measurement (Q898471) (← links)
- Cryptanalysis of simple three-party key exchange protocol (S-3PAKE) (Q931089) (← links)
- Two-factor mutual authentication based on smart cards and passwords (Q955348) (← links)
- Weakness in a RSA-based password authenticated key exchange protocol (Q975486) (← links)
- Simple password-based three-party authenticated key exchange without server public keys (Q975863) (← links)
- A general compiler for password-authenticated group key exchange protocol (Q990138) (← links)
- Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS (Q1008987) (← links)
- Smooth NIZK arguments (Q1629410) (← links)
- Short variable length domain extenders with beyond birthday bound security (Q1633453) (← links)
- Authenticated confidential channel establishment and the security of TLS-DHE (Q1698403) (← links)
- State separation for code-based game-playing proofs (Q1710673) (← links)
- A Markov adversary model to detect vulnerable iOS devices and vulnerabilities in iOS apps (Q1737189) (← links)
- Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol (Q1761614) (← links)
- Anonymity and one-way authentication in key exchange protocols (Q1943977) (← links)
- A simple provably secure AKE from the LWE problem (Q1992397) (← links)
- Towards isogeny-based password-authenticated key establishment (Q2027265) (← links)
- Quantifying the security cost of migrating protocols to practice (Q2096478) (← links)
- Universally composable relaxed password authenticated key exchange (Q2096488) (← links)
- A gapless code-based hash proof system based on RQC and its applications (Q2099170) (← links)
- Practical post-quantum password-authenticated key exchange based-on module-lattice (Q2104427) (← links)
- Tighter proofs for the SIGMA and TLS 1.3 key exchange protocols (Q2117066) (← links)
- The ``Quantum annoying'' property of password-authenticated key exchange protocols (Q2118533) (← links)
- Provable security analysis of FIDO2 (Q2128991) (← links)
- KHAPE: Asymmetric PAKE from key-hiding key exchange (Q2139655) (← links)
- Multipath TLS 1.3 (Q2148751) (← links)
- Verifier-based anonymous password-authenticated key exchange protocol in the standard model (Q2160724) (← links)
- Asymmetric PAKE with low computation \textit{and} communication (Q2170042) (← links)
- A formal security analysis of the Signal messaging protocol (Q2210444) (← links)
- How not to create an isogeny-based PAKE (Q2229270) (← links)
- The TLS handshake protocol: A modular analysis (Q2267369) (← links)
- Simulatable certificateless two-party authenticated key agreement protocol (Q2269791) (← links)