Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS
From MaRDI portal
(Redirected from Publication:1008987)
Recommendations
- A New Key Exchange Protocol Based on MQV Assuming Public Computations
- On the Importance of Public-Key Validation in the MQV and HMQV Key Agreement Protocols
- On the security of the (F)HMQV protocol
- An efficient protocol for authenticated key agreement
- HMQV: A High-Performance Secure Diffie-Hellman Protocol
- Key agreement protocols and their security analysis
- scientific article; zbMATH DE number 1583810
- An Efficient Deniable Key Exchange Protocol (Extended Abstract)
- scientific article; zbMATH DE number 1440045
Cites work
- scientific article; zbMATH DE number 1618043 (Why is no real title available?)
- scientific article; zbMATH DE number 1722690 (Why is no real title available?)
- scientific article; zbMATH DE number 1341873 (Why is no real title available?)
- scientific article; zbMATH DE number 1088239 (Why is no real title available?)
- scientific article; zbMATH DE number 954401 (Why is no real title available?)
- About the Security of MTI/C0 and MQV
- Advances in Cryptology – CRYPTO 2004
- An efficient protocol for authenticated key agreement
- Another look at HMQV
- Authenticated key exchange secure against dictionary attacks
- Examining Indistinguishability-Based Proof Models for Key Establishment Protocols
- HMQV: A High-Performance Secure Diffie-Hellman Protocol
- On the Importance of Public-Key Validation in the MQV and HMQV Key Agreement Protocols
- Public Key Cryptography - PKC 2006
- Security arguments for digital signatures and blind signatures
- Stronger Security of Authenticated Key Exchange
- Validation of Elliptic Curve Public Keys
Cited in
(28)- Towards post-quantum security for signal's X3DH handshake
- A simple provably secure AKE from the LWE problem
- Provably secure three-party password-based authenticated key exchange protocol
- TMQV: A Strongly eCK-Secure Diffie-Hellman Protocol without Gap Assumption
- Efficient public-key distance bounding protocol
- On Forward Secrecy in One-Round Key Exchange
- Towards Denial-of-Service-Resilient Key Agreement Protocols
- Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal
- Strongly Secure Certificateless Key Agreement
- Multi-user CDH problems and the concrete security of \(\mathsf{NAXOS}\) and \(\mathsf{X3DH}\)
- Leaky Random Oracle (Extended Abstract)
- Improved attacks against key reuse in learning with errors key exchange
- NAXOS
- A strongly secure identity-based authenticated group key exchange protocol
- Authenticated Key Exchange and Key Encapsulation in the Standard Model
- CMQV+: an authenticated key exchange protocol from CMQV
- Stronger difficulty notions for client puzzles and denial-of-service-resistant protocols
- Another look at tightness
- On the leakage-resilient key exchange
- Taxonomical security consideration of authenticated key exchange resilient to intermediate computation leakage
- A conference key distribution system
- Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman protocols
- A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols
- Strengthening the security of authenticated key exchange against bad randomness
- A secure and efficient on-line/off-line group key distribution protocol
- Designing efficient authenticated key exchange resilient to leakage of ephemeral secret keys
- Strongly secure one round authenticated key exchange protocol with perfect forward security
- Characterization of strongly secure authenticated key exchanges without NAXOS technique
This page was built for publication: Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1008987)