On the Security of TLS-DHE in the Standard Model
From MaRDI portal
Publication:2914265
DOI10.1007/978-3-642-32009-5_17zbMath1296.94121OpenAlexW2107506969MaRDI QIDQ2914265
Sven Schäge, Florian Kohlar, Jorg Schwenk, Tibor Jager
Publication date: 25 September 2012
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-32009-5_17
Related Items (33)
Signed Diffie-Hellman key exchange with tight security ⋮ Flexible Authenticated and Confidential Channel Establishment (fACCE): Analyzing the Noise Protocol Framework ⋮ Benchmarking Post-quantum Cryptography in TLS ⋮ Towards post-quantum security for signal's X3DH handshake ⋮ Practical isogeny-based key-exchange with optimal tightness ⋮ Short variable length domain extenders with beyond birthday bound security ⋮ Authenticated key exchange and signatures with tight security in the standard model ⋮ Data Is a Stream: Security of Stream-Based Channels ⋮ Modelling Ciphersuite and Version Negotiation in the TLS Protocol ⋮ Zero round-trip time for the extended access control protocol ⋮ On the concrete security of TLS 1.3 PSK mode ⋮ Symmetric Key Exchange with Full Forward Security and Robust Synchronization ⋮ Robust channels: handling unreliable networks in the record layers of QUIC and DTLS 1.3 ⋮ Cryptographic analysis of the Bluetooth secure connection protocol suite ⋮ Post-quantum anonymous one-sided authenticated key exchange without random oracles ⋮ Authenticated confidential channel establishment and the security of TLS-DHE ⋮ Post-quantum key exchange for the Internet and the open quantum safe project ⋮ CCA-secure (puncturable) KEMs from encryption with non-negligible decryption errors ⋮ A formal security analysis of the Signal messaging protocol ⋮ State separation for code-based game-playing proofs ⋮ A cryptographic analysis of the TLS 1.3 handshake protocol ⋮ A Modular Security Analysis of EAP and IEEE 802.11 ⋮ Session resumption protocols and efficient forward security for TLS 1.3 0-RTT ⋮ Secure communication channel establishment: TLS 1.3 (over TCP Fast Open) versus QUIC ⋮ On the tight security of TLS 1.3: theoretically sound cryptographic parameters for real-world deployments ⋮ Generic authenticated key exchange in the quantum random oracle model ⋮ Privacy-preserving authenticated key exchange and the case of IKEv2 ⋮ Tightly-secure authenticated key exchange, revisited ⋮ Signed (group) Diffie-Hellman key exchange with tight security ⋮ Unilaterally-Authenticated Key Exchange ⋮ Privacy-preserving authenticated key exchange for constrained devices ⋮ 0-RTT Key Exchange with Full Forward Secrecy ⋮ Tighter proofs for the SIGMA and TLS 1.3 key exchange protocols
Uses Software
This page was built for publication: On the Security of TLS-DHE in the Standard Model