Pages that link to "Item:Q5451048"
From MaRDI portal
The following pages link to HMQV: A High-Performance Secure Diffie-Hellman Protocol (Q5451048):
Displaying 50 items.
- HMQV (Q15253) (← links)
- Blake-Wilson, Johnson \& Menezes protocol revisited (Q350869) (← links)
- Provably secure three-party password-based authenticated key exchange protocol (Q425526) (← links)
- CMQV+: an authenticated key exchange protocol from CMQV (Q439860) (← links)
- On weaknesses of the HDCP authentication and key exchange protocol and its repair (Q445345) (← links)
- Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal (Q488261) (← links)
- Cryptanalysis of a chaotic map-based password-authenticated key agreement protocol using smart cards (Q493916) (← links)
- Strongly secure authenticated key exchange from factoring, codes, and lattices (Q494585) (← links)
- A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols (Q507654) (← links)
- Certificateless one-pass and two-party authenticated key agreement protocol and its extensions (Q508905) (← links)
- A security weakness in Abdalla et al.'s generic construction of a group key exchange protocol (Q621633) (← links)
- Certificateless public key encryption: a new generic construction and two pairing-free schemes (Q627164) (← links)
- An efficient authenticated key exchange from random self-reducibility on CSIDH (Q831632) (← links)
- Towards post-quantum security for signal's X3DH handshake (Q832361) (← links)
- Practical isogeny-based key-exchange with optimal tightness (Q832367) (← links)
- Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode (Q848272) (← links)
- On security analysis of an after-the-fact leakage resilient key exchange protocol (Q888956) (← links)
- FORSAKES: a forward-secure authenticated key exchange protocol based on symmetric key-evolving schemes (Q895004) (← links)
- An improved identity-based key agreement protocol and its security proof (Q1007846) (← links)
- Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS (Q1008987) (← links)
- Short variable length domain extenders with beyond birthday bound security (Q1633453) (← links)
- Full indifferentiable security of the XOR of two or more random permutations using the \(\chi^2\) method (Q1648806) (← links)
- Authenticated confidential channel establishment and the security of TLS-DHE (Q1698403) (← links)
- State separation for code-based game-playing proofs (Q1710673) (← links)
- Preserving privacy for free: efficient and provably secure two-factor authentication scheme with user anonymity (Q1750012) (← links)
- Anonymity and one-way authentication in key exchange protocols (Q1943977) (← links)
- Extended KCI attack against two-party key establishment protocols (Q1944127) (← links)
- A simple provably secure AKE from the LWE problem (Q1992397) (← links)
- Generic authenticated key exchange in the quantum random oracle model (Q2055699) (← links)
- Privacy-preserving authenticated key exchange and the case of IKEv2 (Q2055708) (← links)
- Tightly-secure authenticated key exchange, revisited (Q2056675) (← links)
- Group key exchange protocols from supersingular isogenies (Q2057142) (← links)
- On the (in)security of the Diffie-Hellman oblivious PRF with multiplicative blinding (Q2061963) (← links)
- An efficient and generic construction for Signal's handshake (X3DH): post-quantum, state leakage secure, and deniable (Q2061966) (← links)
- Universally composable relaxed password authenticated key exchange (Q2096488) (← links)
- A key manipulation attack on some recent isogeny-based key agreement protocols (Q2119312) (← links)
- An efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniable (Q2135524) (← links)
- Authenticated key exchange and signatures with tight security in the standard model (Q2139653) (← links)
- KHAPE: Asymmetric PAKE from key-hiding key exchange (Q2139655) (← links)
- Improved attacks against key reuse in learning with errors key exchange (Q2146089) (← links)
- More efficient post-quantum KEMTLS with pre-distributed public keys (Q2146154) (← links)
- Asymmetric PAKE with low computation \textit{and} communication (Q2170042) (← links)
- On the concrete security of TLS 1.3 PSK mode (Q2170074) (← links)
- A formal security analysis of the Signal messaging protocol (Q2210444) (← links)
- Strengthening the security of authenticated key exchange against bad randomness (Q2413007) (← links)
- Resource-aware protocols for authenticated group key exchange in integrated wired and wireless networks (Q2456502) (← links)
- A new framework for deniable secure key exchange (Q2672249) (← links)
- Two-pass authenticated key exchange with explicit authentication and tight security (Q2692405) (← links)
- Post-Quantum Forward-Secure Onion Routing (Q2794504) (← links)
- Security Analysis of the Modular Enhanced Symmetric Role Authentication (mERA) Protocol (Q2803662) (← links)