The following pages link to (Q4263430):
Displayed 21 items.
- A round-optimal three-party ID-based authenticated key agreement protocol (Q425537) (← links)
- Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal (Q488261) (← links)
- Cryptanalysis of tripartite and multi-party authenticated key agreement protocols (Q867668) (← links)
- The random oracle model: a twenty-year retrospective (Q887442) (← links)
- Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS (Q1008987) (← links)
- Efficient identity-based authenticated key agreement protocol from pairings (Q1763263) (← links)
- Privacy-preserving authenticated key exchange and the case of IKEv2 (Q2055708) (← links)
- An efficient and generic construction for Signal's handshake (X3DH): post-quantum, state leakage secure, and deniable (Q2061966) (← links)
- An efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniable (Q2135524) (← links)
- Malleability and ownership of proxy signatures: towards a stronger definition and its limitations (Q2176286) (← links)
- The lattice-based digital signature scheme qTESLA (Q2229291) (← links)
- Certificateless signature: a new security model and an improved generic construction (Q2383987) (← links)
- Lattice-based completely non-malleable public-key encryption in the standard model (Q2448075) (← links)
- Weakness in ID-based one round authenticated tripartite multiple-key agreement protocol with pairings (Q2485651) (← links)
- Security flaws in authentication and key establishment protocols for mobile communications (Q2572325) (← links)
- Two-pass authenticated key exchange with explicit authentication and tight security (Q2692405) (← links)
- Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes (Q3194597) (← links)
- A Critical Analysis and Improvement of AACS Drive-Host Authentication (Q3511150) (← links)
- Methodology for assessing the security of cryptographic protocols (Q5089858) (← links)
- Атаки на схемы электронной подписи, не учитываемые традиционными определениями стойкости, и меры противодействия им (Q5152416) (← links)
- Key Substitution in the Symbolic Analysis of Cryptographic Protocols (Q5458828) (← links)