Strongly secure key exchange protocol with minimal KEM
From MaRDI portal
Publication:1631908
Recommendations
- Two-pass authenticated key exchange with explicit authentication and tight security
- 2-pass key exchange protocols from CPA-secure KEM
- Tightly secure two-pass authenticated key exchange protocol in the CK model
- Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices
- Compact authenticated key exchange from bounded CCA-secure KEM
Cited in
(10)- Efficient One-Round Key Exchange in the Standard Model
- Authenticated Key Exchange and Key Encapsulation in the Standard Model
- Two-message authenticated key exchange from public-key encryption
- Tightly secure two-pass authenticated key exchange protocol in the CK model
- Two-pass authenticated key exchange with explicit authentication and tight security
- Modular design of KEM-based authenticated key exchange
- One-round authenticated key exchange without implementation trick
- Compact authenticated key exchange from bounded CCA-secure KEM
- 2-pass key exchange protocols from CPA-secure KEM
- Understanding and constructing AKE via double-key key encapsulation mechanism
This page was built for publication: Strongly secure key exchange protocol with minimal KEM
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1631908)