Pages that link to "Item:Q5261647"
From MaRDI portal
The following pages link to Tightly-Secure Authenticated Key Exchange (Q5261647):
Displayed 41 items.
- Generic construction for tightly-secure signatures from discrete log (Q820557) (← links)
- Signed Diffie-Hellman key exchange with tight security (Q826255) (← links)
- Memory lower bounds of reductions revisited (Q1648781) (← links)
- On the tight security of TLS 1.3: theoretically sound cryptographic parameters for real-world deployments (Q2044755) (← links)
- Signatures from sequential-OR proofs (Q2055653) (← links)
- Tightly-secure authenticated key exchange, revisited (Q2056675) (← links)
- More efficient digital signatures with tight multi-user security (Q2061945) (← links)
- An efficient and generic construction for Signal's handshake (X3DH): post-quantum, state leakage secure, and deniable (Q2061966) (← links)
- Signed (group) Diffie-Hellman key exchange with tight security (Q2082164) (← links)
- Efficient and tight oblivious transfer from PKE with tight multi-user security (Q2096634) (← links)
- Tighter proofs for the SIGMA and TLS 1.3 key exchange protocols (Q2117066) (← links)
- Short identity-based signatures with tight security from lattices (Q2118556) (← links)
- An efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniable (Q2135524) (← links)
- Authenticated key exchange and signatures with tight security in the standard model (Q2139653) (← links)
- Tightness subtleties for multi-user PKE notions (Q2149787) (← links)
- On the concrete security of TLS 1.3 PSK mode (Q2170074) (← links)
- Tightly CCA-secure encryption scheme in a multi-user setting with corruptions (Q2205895) (← links)
- A formal security analysis of the Signal messaging protocol (Q2210444) (← links)
- Tight security for the generic construction of identity-based signature (in the multi-instance setting) (Q2210521) (← links)
- Generalized public-key cryptography with tight security (Q2225176) (← links)
- Tightly secure ring signatures in the standard model (Q2235773) (← links)
- Tightly secure signature schemes from the LWE and subset sum assumptions (Q2330120) (← links)
- On the adaptive security of MACs and PRFs (Q2692364) (← links)
- Two-pass authenticated key exchange with explicit authentication and tight security (Q2692405) (← links)
- Towards tight adaptive security of non-interactive key exchange (Q2697896) (← links)
- Déjà Q All Over Again: Tighter and Broader Reductions of q-Type Assumptions (Q2953792) (← links)
- Equivalences and Black-Box Separations of Matrix Diffie-Hellman Problems (Q5738797) (← links)
- Session resumption protocols and efficient forward security for TLS 1.3 0-RTT (Q5918347) (← links)
- Tightly secure hierarchical identity-based encryption (Q5919017) (← links)
- Simulation-based receiver selective opening CCA secure PKE from standard computational assumptions (Q5919680) (← links)
- Digital Signatures with Memory-Tight Security in the Multi-challenge Setting (Q6041292) (← links)
- Multi-user CDH problems and the concrete security of \(\mathsf{NAXOS}\) and \(\mathsf{X3DH}\) (Q6057198) (← links)
- Deniable authentication when signing keys leak (Q6085263) (← links)
- Almost tight multi-user security under adaptive corruptions \& leakages in the standard model (Q6085265) (← links)
- Fuzzy authenticated key exchange with tight security (Q6109440) (← links)
- Lattice-based signatures with tight adaptive corruptions and more (Q6113962) (← links)
- Privacy-preserving authenticated key exchange in the standard model (Q6135434) (← links)
- On optimal tightness for key exchange with full forward secrecy via key confirmation (Q6149609) (← links)
- Key encapsulation mechanism with tight enhanced security in the multi-user setting: impossibility result and optimal tightness (Q6157528) (← links)
- Lattice-based authenticated key exchange with tight security (Q6190151) (← links)
- Almost tight multi-user security under adaptive corruptions from LWE in the standard model (Q6190153) (← links)