Strongly leakage resilient authenticated key exchange, revisited
From MaRDI portal
Publication:2334443
DOI10.1007/S10623-019-00656-3zbMATH Open1423.94116OpenAlexW2952487549MaRDI QIDQ2334443FDOQ2334443
Authors: Guomin Yang, Rongmao Chen, Yi Mu, Willy Susilo, Fuchun Guo, Jie Li
Publication date: 7 November 2019
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10623-019-00656-3
Recommendations
- Strongly leakage-resilient authenticated key exchange
- Leakage-resilient authenticated key establishment protocols
- On the leakage-resilient key exchange
- Security of a Leakage-Resilient Protocol for Key Establishment and Mutual Authentication
- Tightly-secure authenticated key exchange, revisited
- Standard model leakage-resilient authenticated key exchange using inner-product extractors
- Sufficient condition for identity-based authenticated key exchange resilient to leakage of secret keys
- Designing efficient authenticated key exchange resilient to leakage of ephemeral secret keys
- Leakage-resilient authenticated encryption from leakage-resilient pseudorandom functions
Cites Work
- On ideal lattices and learning with errors over rings
- On lattices, learning with errors, random linear codes, and cryptography
- Efficient public-key cryptography in the presence of key leakage
- Simultaneous Hardcore Bits and Cryptography against Memory Attacks
- New directions in cryptography
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
- Title not available (Why is that?)
- On cryptography with auxiliary input
- Theory of Cryptography
- After-the-fact leakage in public-key encryption
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- Title not available (Why is that?)
- Stronger Security of Authenticated Key Exchange
- Title not available (Why is that?)
- Authenticated Key Exchange and Key Encapsulation in the Standard Model
- Examining Indistinguishability-Based Proof Models for Key Establishment Protocols
- Advances in Cryptology - CRYPTO 2003
- Signature schemes secure against hard-to-invert leakage
- Lattice cryptography for the internet
- Continuous After-the-Fact Leakage-Resilient Key Exchange
- Strongly leakage-resilient authenticated key exchange
- Strong authenticated key exchange with auxiliary inputs
Cited In (12)
- Continuous leakage-resilient certificate-based signcryption scheme and application in cloud computing
- Reducing the cost of authenticity with leakages: a CIML2-secure AE scheme with one call to a strongly protected tweakable block cipher
- Strong authenticated key exchange with auxiliary inputs
- Continuous After-the-Fact Leakage-Resilient Key Exchange
- Novel generic construction of leakage-resilient PKE scheme with CCA security
- Leakage-resilient key exchange and two-seed extractors
- On the leakage-resilient key exchange
- Strongly leakage-resilient authenticated key exchange
- Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices
- Leakage-resilient authenticated key establishment protocols
- Standard model leakage-resilient authenticated key exchange using inner-product extractors
- Public-key encryption scheme with optimal continuous leakage resilience
Uses Software
This page was built for publication: Strongly leakage resilient authenticated key exchange, revisited
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2334443)