Privacy-preserving authenticated key exchange for constrained devices
From MaRDI portal
Publication:2096615
DOI10.1007/978-3-031-09234-3_15OpenAlexW4285146462MaRDI QIDQ2096615
Publication date: 9 November 2022
Full work available at URL: https://doi.org/10.1007/978-3-031-09234-3_15
Cryptography (94A60) Authentication, digital signatures and secret sharing (94A62) Internet topics (68M11) Computer security (68M25)
Uses Software
Cites Work
- Unnamed Item
- Symmetric-key authenticated key exchange (SAKE) with perfect forward secrecy
- Authenticated encryption: relations among notions and analysis of the generic composition paradigm
- Privacy-preserving authenticated key exchange and the case of IKEv2
- Safely Exporting Keys from Secure Channels
- On the Security of TLS-DHE in the Standard Model
- Traceable Privacy of Recent Provably-Secure RFID Protocols
- Lighten Encryption Schemes for Secure and Private RFID Systems
- The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
- Key agreement protocols and their security analysis
- On Privacy Models for RFID
- Space/time trade-offs in hash coding with allowable errors
This page was built for publication: Privacy-preserving authenticated key exchange for constrained devices