Standard model leakage-resilient authenticated key exchange using inner-product extractors
From MaRDI portal
Publication:2119952
DOI10.1007/S10623-022-01028-0zbMATH Open1485.94049OpenAlexW3185193223WikidataQ114226824 ScholiaQ114226824MaRDI QIDQ2119952FDOQ2119952
Authors: Janaka Alawatugoda, Tatsuaki Okamoto
Publication date: 31 March 2022
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10623-022-01028-0
Recommendations
- Leakage-resilient cryptography from the inner-product extractor
- Privacy-preserving authenticated key exchange in the standard model
- Strongly leakage resilient authenticated key exchange, revisited
- Strongly leakage-resilient authenticated key exchange
- On the leakage-resilient key exchange
- Leakage-resilient key exchange and two-seed extractors
- Leakage-resilient authenticated key establishment protocols
- Security of a Leakage-Resilient Protocol for Key Establishment and Mutual Authentication
- Privacy-preserving multi-factor key exchange protocol in the standard model
Cites Work
- Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
- New directions in cryptography
- Title not available (Why is that?)
- Chosen‐Ciphertext Security from Identity‐Based Encryption
- On the leakage-resilient key exchange
- Leakage-resilient cryptography from the inner-product extractor
- Title not available (Why is that?)
- Examining smart-card security under the threat of power analysis attacks
- Stronger Security of Authenticated Key Exchange
- Title not available (Why is that?)
- One-round key exchange in the standard model
- Continuous after-the-fact leakage-resilient eCK-secure key exchange
- Continuous After-the-Fact Leakage-Resilient Key Exchange
- Leakage-resilient non-interactive key exchange in the continuous-memory leakage setting
- Strongly leakage resilient authenticated key exchange, revisited
- Strongly leakage-resilient authenticated key exchange
- Strong authenticated key exchange with auxiliary inputs
Cited In (3)
Uses Software
This page was built for publication: Standard model leakage-resilient authenticated key exchange using inner-product extractors
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2119952)