A new framework for deniable secure key exchange
From MaRDI portal
Publication:2672249
Recommendations
Cites work
- scientific article; zbMATH DE number 1808213 (Why is no real title available?)
- scientific article; zbMATH DE number 3960854 (Why is no real title available?)
- scientific article; zbMATH DE number 176566 (Why is no real title available?)
- scientific article; zbMATH DE number 1302835 (Why is no real title available?)
- scientific article; zbMATH DE number 1302864 (Why is no real title available?)
- scientific article; zbMATH DE number 1024060 (Why is no real title available?)
- scientific article; zbMATH DE number 1088228 (Why is no real title available?)
- scientific article; zbMATH DE number 1942439 (Why is no real title available?)
- scientific article; zbMATH DE number 2009957 (Why is no real title available?)
- scientific article; zbMATH DE number 1775426 (Why is no real title available?)
- scientific article; zbMATH DE number 1775427 (Why is no real title available?)
- scientific article; zbMATH DE number 2086698 (Why is no real title available?)
- Advances in Cryptology - CRYPTO 2003
- Advances in Cryptology - CRYPTO 2003
- Advances in Cryptology - CRYPTO 2003
- Advances in Cryptology – CRYPTO 2004
- An Efficient Deniable Key Exchange Protocol (Extended Abstract)
- Bi-deniable public-key encryption
- Composability and On-Line Deniability of Authentication
- Deniable internet key exchange
- Fully deniable interactive encryption
- HMQV: A High-Performance Secure Diffie-Hellman Protocol
- New approaches for deniable authentication
- New directions in cryptography
- Nonmalleable Cryptography
- On the Provable Security of an Efficient RSA-Based Pseudorandom Generator
- Plaintext-awareness of hybrid encryption
- Public Key Cryptography - PKC 2006
- Quantum deniable authentication protocol
- Secure Hybrid Encryption from Weakened Key Encapsulation
- The Cramer-Shoup Encryption Scheme Is Plaintext Aware in the Standard Model
- The Knowledge Complexity of Interactive Proof Systems
- Timed encryption with application to deniable key exchange
- Towards Plaintext-Aware Public-Key Encryption Without Random Oracles
Cited in
(13)- Privacy-preserving authenticated key exchange and the case of IKEv2
- Deniable version of SIGMA key exchange protocol resilient to ephemeral key leakage
- A deniable authenticated 2 party key agreement protocol from bilinear pairing
- An Efficient Deniable Key Exchange Protocol (Extended Abstract)
- DSH: Deniable Secret Handshake Framework
- Deniable Authentication on the Internet
- Timed encryption with application to deniable key exchange
- Timed encryption with application to deniable key exchange
- Towards bidirectional ratcheted key exchange
- scientific article; zbMATH DE number 2086717 (Why is no real title available?)
- Public Key Cryptography – PKC 2004
- Deniable group key agreement
- Deniable internet key exchange
This page was built for publication: A new framework for deniable secure key exchange
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2672249)