An efficient protocol for authenticated key agreement
DOI10.1023/A:1022595222606zbMATH Open1016.94025OpenAlexW1927099252WikidataQ56771132 ScholiaQ56771132MaRDI QIDQ1869822FDOQ1869822
Authors: Laurie Law, Minghua Qu, Scott A. Vanstone, Alfred Menezes, Jerome A. Solinas
Publication date: 28 April 2003
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1023/a:1022595222606
Recommendations
Cryptography (94A60) Algebraic coding theory; cryptography (number-theoretic aspects) (11T71) Authentication, digital signatures and secret sharing (94A62)
Cited In (60)
- Improved authenticated multi-key agreement protocol
- An efficient eCK secure identity based two party authenticated key agreement scheme with security against active adversaries
- Topics in Cryptology – CT-RSA 2006
- The GN-authenticated key agreement
- Security flaws in authentication and key establishment protocols for mobile communications
- Title not available (Why is that?)
- Computational Science and Its Applications – ICCSA 2004
- A key manipulation attack on some recent isogeny-based key agreement protocols
- An improved two-party identity-based authenticated key agreement protocol using pairings
- An authenticated key exchange protocol in elliptic curve cryptography
- Multi-party authenticated key agreement protocols from multi-linear forms
- An efficient and secure protocol for multi-party key establishment
- An efficient dynamic authenticated key exchange protocol with selectable identities
- Batch Computations Revisited: Combining Key Computations and Batch Verifications
- Efficient public-key distance bounding protocol
- Information Security and Cryptology - ICISC 2005
- Title not available (Why is that?)
- A Provably Secure One-Pass Two-Party Key Establishment Protocol
- Cryptanalysis and design of a three-party authenticated key exchange protocol using smart card
- Title not available (Why is that?)
- Cryptanalysis of tripartite and multi-party authenticated key agreement protocols
- Title not available (Why is that?)
- Title not available (Why is that?)
- On the cryptographic properties of algorithms accompanying the applications of standards GOST R 34.11-2012 and GOST R 34.10-2012
- A New Security Model for Authenticated Key Agreement
- Strongly Secure Certificateless Key Agreement
- Preventing unknown key-share attack using cryptographic bilinear maps
- Improved attacks against key reuse in learning with errors key exchange
- Efficient identity-based authenticated key agreement protocol from pairings
- Finding and fixing vulnerabilities in several three-party password authenticated key exchange protocols without server public keys
- Decaf: eliminating cofactors through point compression
- Guest editorial: Special issue in honor of Scott A. Vanstone
- A generic variant of NIST'S KAS2 key agreement protocol
- Authenticated Key Exchange and Key Encapsulation in the Standard Model
- CMQV+: an authenticated key exchange protocol from CMQV
- Another look at HMQV
- The whole is less than the sum of its parts: constructing more efficient lattice-based AKEs
- Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS
- Modeling energy-efficient secure communications in multi-mode wireless mobile devices
- A novel protocol for multiparty quantum key management
- Taxonomical security consideration of authenticated key exchange resilient to intermediate computation leakage
- FORSAKES: a forward-secure authenticated key exchange protocol based on symmetric key-evolving schemes
- Key agreement via protocols
- Secure and efficient WTLS handshake protocol
- Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman protocols
- Simple Security Definitions for and Constructions of 0-RTT Key Exchange
- Anonymity and one-way authentication in key exchange protocols
- Efficient User Authentication and Key Agreement in Ubiquitous Computing
- A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols
- Lattice-based fault attacks against ECMQV
- Algorithms and Computation
- Designing efficient authenticated key exchange resilient to leakage of ephemeral secret keys
- More efficient post-quantum KEMTLS with pre-distributed public keys
- Digital friend-or-foe authentication
- Modular Design of Role-Symmetric Authenticated Key Exchange Protocols
- Title not available (Why is that?)
- A strengthened eCK secure identity based authenticated key agreement protocol based on the standard CDH assumption
- Multi-user CDH problems and the concrete security of \(\mathsf{NAXOS}\) and \(\mathsf{X3DH}\)
- \textsf{TOPAS} 2-pass key exchange with full perfect forward secrecy and optimal communication complexity
- A Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor Networks
This page was built for publication: An efficient protocol for authenticated key agreement
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1869822)