An efficient protocol for authenticated key agreement
From MaRDI portal
Recommendations
Cited in
(60)- On the cryptographic properties of algorithms accompanying the applications of standards GOST R 34.11-2012 and GOST R 34.10-2012
- Cryptanalysis and design of a three-party authenticated key exchange protocol using smart card
- Efficient public-key distance bounding protocol
- Topics in Cryptology – CT-RSA 2006
- Modeling energy-efficient secure communications in multi-mode wireless mobile devices
- A novel protocol for multiparty quantum key management
- Key agreement via protocols
- scientific article; zbMATH DE number 5670521 (Why is no real title available?)
- Lattice-based fault attacks against ECMQV
- Guest editorial: Special issue in honor of Scott A. Vanstone
- The GN-authenticated key agreement
- Security flaws in authentication and key establishment protocols for mobile communications
- Efficient identity-based authenticated key agreement protocol from pairings
- scientific article; zbMATH DE number 2118253 (Why is no real title available?)
- Secure and efficient WTLS handshake protocol
- Algorithms and Computation
- A key manipulation attack on some recent isogeny-based key agreement protocols
- Taxonomical security consideration of authenticated key exchange resilient to intermediate computation leakage
- Designing efficient authenticated key exchange resilient to leakage of ephemeral secret keys
- Authenticated Key Exchange and Key Encapsulation in the Standard Model
- FORSAKES: a forward-secure authenticated key exchange protocol based on symmetric key-evolving schemes
- scientific article; zbMATH DE number 2217755 (Why is no real title available?)
- An improved two-party identity-based authenticated key agreement protocol using pairings
- Cryptanalysis of tripartite and multi-party authenticated key agreement protocols
- Simple Security Definitions for and Constructions of 0-RTT Key Exchange
- scientific article; zbMATH DE number 1186874 (Why is no real title available?)
- Computational Science and Its Applications – ICCSA 2004
- scientific article; zbMATH DE number 1583949 (Why is no real title available?)
- More efficient post-quantum KEMTLS with pre-distributed public keys
- Anonymity and one-way authentication in key exchange protocols
- Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS
- Information Security and Cryptology - ICISC 2005
- A New Security Model for Authenticated Key Agreement
- A Provably Secure One-Pass Two-Party Key Establishment Protocol
- CMQV+: an authenticated key exchange protocol from CMQV
- Preventing unknown key-share attack using cryptographic bilinear maps
- Another look at HMQV
- Finding and fixing vulnerabilities in several three-party password authenticated key exchange protocols without server public keys
- An efficient and secure protocol for multi-party key establishment
- A generic variant of NIST'S KAS2 key agreement protocol
- Efficient User Authentication and Key Agreement in Ubiquitous Computing
- Decaf: eliminating cofactors through point compression
- An authenticated key exchange protocol in elliptic curve cryptography
- An efficient dynamic authenticated key exchange protocol with selectable identities
- Batch Computations Revisited: Combining Key Computations and Batch Verifications
- Multi-party authenticated key agreement protocols from multi-linear forms
- Strongly Secure Certificateless Key Agreement
- Improved authenticated multi-key agreement protocol
- A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols
- An efficient eCK secure identity based two party authenticated key agreement scheme with security against active adversaries
- Improved attacks against key reuse in learning with errors key exchange
- The whole is less than the sum of its parts: constructing more efficient lattice-based AKEs
- Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman protocols
- Modular Design of Role-Symmetric Authenticated Key Exchange Protocols
- scientific article; zbMATH DE number 7746256 (Why is no real title available?)
- \textsf{TOPAS} 2-pass key exchange with full perfect forward secrecy and optimal communication complexity
- Digital friend-or-foe authentication
- A Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor Networks
- Multi-user CDH problems and the concrete security of \(\mathsf{NAXOS}\) and \(\mathsf{X3DH}\)
- A strengthened eCK secure identity based authenticated key agreement protocol based on the standard CDH assumption
This page was built for publication: An efficient protocol for authenticated key agreement
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1869822)