Cryptanalysis of RLWE-based one-pass authenticated key exchange
From MaRDI portal
Publication:1673602
Recommendations
- Authenticated key exchange from ideal lattices
- Provably secure password authenticated key exchange based on RLWE for the post-quantum world
- Complete attack on RLWE key exchange with reused keys, without signal leakage
- A simple provably secure AKE from the LWE problem
- Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices
Cited in
(8)- A simple provably secure AKE from the LWE problem
- Post-quantum anonymous one-sided authenticated key exchange without random oracles
- Post-quantum secure remote password protocol from RLWE problem
- Identity-concealed authenticated encryption from ring learning with errors
- Complete attack on RLWE key exchange with reused keys, without signal leakage
- Provably secure password authenticated key exchange based on RLWE for the post-quantum world
- One sample ring-LWE with rounding and its application to key exchange
- Authenticated key exchange from ideal lattices
This page was built for publication: Cryptanalysis of RLWE-based one-pass authenticated key exchange
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1673602)