Berkant Ustaoglu

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Malleability and ownership of proxy signatures: towards a stronger definition and its limitations
Advances in Mathematics of Communications
2020-05-04Paper
Quantum key distribution in the classical authenticated key exchange framework
Post-Quantum Cryptography
2013-06-14Paper
Quantum key distribution in the classical authenticated key exchange framework
Post-Quantum Cryptography
2013-06-14Paper
Anonymity and one-way authentication in key exchange protocols
Designs, Codes and Cryptography
2013-04-03Paper
Sufficient Condition for Ephemeral Key-Leakage Resilient Tripartite Key Exchange
Information Security and Privacy
2012-09-07Paper
A generic variant of NIST'S KAS2 key agreement protocol
Information Security and Privacy
2011-07-07Paper
Invalid-curve attacks on (hyper)elliptic curve cryptosystems
Advances in Mathematics of Communications
2011-06-03Paper
On reusing ephemeral keys in Diffie-Hellman key agreement protocols
International Journal of Applied Cryptography
2011-04-05Paper
Combined security analysis of the one- and three-pass unified model key agreement protocols
Progress in Cryptology - INDOCRYPT 2010
2010-12-07Paper
Ephemeral key leakage resilient and efficient ID-AKEs that can share identities, private and master keys
Lecture Notes in Computer Science
2010-11-26Paper
Modeling leakage of ephemeral secrets in tripartite/group key exchange
Information, Security and Cryptology – ICISC 2009
2010-07-16Paper
Reusing static keys in key agreement protocols
Progress in Cryptology - INDOCRYPT 2009
2009-12-17Paper
Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman protocols
Provable Security
2009-12-11Paper
Towards Denial-of-Service-Resilient Key Agreement Protocols
Information Security and Privacy
2009-06-25Paper
Comparing the pre- and post-specified peer models for key agreement
International Journal of Applied Cryptography
2009-05-12Paper
Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS
Designs, Codes and Cryptography
2009-03-31Paper
Comparing the Pre- and Post-specified Peer Models for Key Agreement
Information Security and Privacy
2008-07-08Paper
On the Importance of Public-Key Validation in the MQV and HMQV Key Agreement Protocols
Progress in Cryptology - INDOCRYPT 2006
2008-04-11Paper


Research outcomes over time


This page was built for person: Berkant Ustaoglu