scientific article; zbMATH DE number 1263181

From MaRDI portal
Publication:4234051

zbMath0916.94006MaRDI QIDQ4234051

Mihir Bellare, Phillip Rogaway

Publication date: 22 July 1999


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items

Towards secure quantum key distribution protocol for wireless LANs: a hybrid approach, Standard model leakage-resilient authenticated key exchange using inner-product extractors, Participant attack on three-party quantum key agreement with two-photon entanglement, Short variable length domain extenders with beyond birthday bound security, Blake-Wilson, Johnson \& Menezes protocol revisited, Security weakness in a three-party pairing-based protocol for password authenticated key exchange, Efficient arbitrated quantum signature and its proof of security, Bounds and constructions for unconditionally secure distributed key distribution schemes for general access structures, Hardware security without secure hardware: how to decrypt with a password and a server, Methodology for assessing the security of cryptographic protocols, Round-optimal password-based authenticated key exchange, An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices, Strengthening the security of authenticated key exchange against bad randomness, On the leakage-resilient key exchange, A strengthened eCK secure identity based authenticated key agreement protocol based on the standard CDH assumption, One-Round Attribute-Based Key Exchange in the Multi-party Setting, FORSAKES: a forward-secure authenticated key exchange protocol based on symmetric key-evolving schemes, Improving the security of protocols of quantum key agreement solely using Bell states and Bell measurement, Two-server password-only authenticated key exchange, On optimal tightness for key exchange with full forward secrecy via key confirmation, One-Round Attribute-Based Key Exchange in the Multi-Party Setting, State separation for code-based game-playing proofs, The meeting businessmen problem: requirements and limitations, An efficient eCK secure identity based two party authenticated key agreement scheme with security against active adversaries, Security weaknesses of a signature scheme and authenticated key agreement protocols, A Universally Composable Group Key Exchange Protocol with Minimum Communication Effort, Authentication Revisited: Flaw or Not, the Recursive Authentication Protocol, Cryptanalysis of simple three-party key exchange protocol (S-3PAKE), Resource-aware protocols for authenticated group key exchange in integrated wired and wireless networks, Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal, Transducer-based analysis of cryptographic protocols, Three weaknesses in a simple three-party key exchange protocol, An Efficient Password Authenticated Key Exchange Protocol with Bilinear Parings, Two-factor mutual authentication based on smart cards and passwords, A Modular Security Analysis of EAP and IEEE 802.11, Multi-attacker protocol validation, Simple password-based three-party authenticated key exchange without server public keys, The TLS handshake protocol: A modular analysis, Provably secure and efficient identification and key agreement protocol with user anonymity, Provably Secure N-Party Authenticated Key Exchange in the Multicast DPWA Setting, A Modular Security Analysis of the TLS Handshake Protocol, Modular proofs for key exchange: rigorous optimizations in the Canetti-Krawczyk model, SAS-Based Group Authentication and Key Agreement Protocols, Strongly secure identity-based authenticated key agreement protocols without bilinear pairings, Authenticated Key Exchange with Entities from Different Settings and Varied Groups, On \(\tau\)-time secure key agreement, Ideal Key Derivation and Encryption in Simulation-Based Security, Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework, Comparison-Based Key Exchange and the Security of the Numeric Comparison Mode in Bluetooth v2.1, Доказательство защищенности протокола обмена ключами, On the Minimum Communication Effort for Secure Group Key Exchange, A ramp model for distributed key distribution schemes, Security Analysis of Standard Authentication and Key Agreement Protocols Utilising Timestamps, Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness, Analysis of the SSH Key Exchange Protocol, On Forward Secrecy in One-Round Key Exchange, A calculus for cryptographic protocols: The spi calculus, The GN-authenticated key agreement, Initiator-Resilient Universally Composable Key Exchange