Fuzzy password-authenticated key exchange
From MaRDI portal
Recommendations
- Fuzzy asymmetric password-authenticated key exchange
- Fuzzy authenticated key exchange with tight security
- Password-based authenticated key exchange
- Anonymous Password-Based Authenticated Key Exchange
- scientific article; zbMATH DE number 2009978
- Selected Areas in Cryptography
- Efficient and secure authenticated key exchange using weak passwords
- Fuzzy Identity-Based Encryption
- Universally composable relaxed password authenticated key exchange
Cited in
(18)- Generalized fuzzy password-authenticated key exchange from error correcting codes
- scientific article; zbMATH DE number 1947532 (Why is no real title available?)
- Witness-authenticated key exchange, revisited: extensions to groups, improved models, simpler constructions
- Fuzzy authenticated key exchange with tight security
- Wireless-channel key exchange
- A universally composable PAKE with zero communication cost. (And why it shouldn't be considered UC-secure)
- Fuzzy Vault for Multiple Users
- A framework for UC secure privacy preserving biometric authentication using efficient functional encryption
- Computational fuzzy extractors
- Fuzzy private set intersection with large hyperballs
- Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets
- BETA: biometric-enabled threshold authentication
- EKE meets tight security in the universally composable framework
- Bare PAKE: universally composable key exchange from just passwords
- Fuzzy asymmetric password-authenticated key exchange
- Password Mistyping in Two-Factor-Authenticated Key Exchange
- GeT a CAKE: \underline{Ge}neric \underline{T}ransformations from \underline{K}ey encaspulation mechanisms to password \underline{A}uthenticated \underline{K}ey \underline{E}xchanges
- Upgrading fuzzy extractors
This page was built for publication: Fuzzy password-authenticated key exchange
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1653099)