Key agreement protocols and their security analysis

From MaRDI portal
Publication:4400561

DOI10.1007/BFb0024447zbMath0904.94008MaRDI QIDQ4400561

No author found.

Publication date: 2 August 1998

Published in: Crytography and Coding (Search for Journal in Brave)




Related Items

Participant attack on three-party quantum key agreement with two-photon entanglement, Another Look at Tightness, A secure MAKAP for wireless communication, Improved authenticated multi-key agreement protocol, An efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniable, Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode, EC2C-PAKA: an efficient client-to-client password-authenticated key agreement, Blake-Wilson, Johnson \& Menezes protocol revisited, Methodology for assessing the security of cryptographic protocols, Strengthening the security of authenticated key exchange against bad randomness, Connecting tweakable and multi-key blockcipher security, KCI-resilient anonymous wireless link-layer authentication protocols, A strengthened eCK secure identity based authenticated key agreement protocol based on the standard CDH assumption, Provably secure identity-based authenticated key agreement protocols with malicious private key generators, FORSAKES: a forward-secure authenticated key exchange protocol based on symmetric key-evolving schemes, An improved two-party identity-based authenticated key agreement protocol using pairings, Improving the security of protocols of quantum key agreement solely using Bell states and Bell measurement, A Critical Analysis and Improvement of AACS Drive-Host Authentication, Post-quantum signal key agreement from SIDH, Post-quantum asynchronous deniable key exchange and the signal handshake, Cryptanalytic Flaws in Oh et al.’s ID-Based Authenticated Key Agreement Protocol, Anonymity and one-way authentication in key exchange protocols, Security weaknesses of authenticated key agreement protocols, Extended KCI attack against two-party key establishment protocols, Authenticated confidential channel establishment and the security of TLS-DHE, An efficient eCK secure identity based two party authenticated key agreement scheme with security against active adversaries, Security weaknesses of a signature scheme and authenticated key agreement protocols, Finding and fixing vulnerabilities in several three-party password authenticated key exchange protocols without server public keys, A novel protocol for multiparty quantum key management, A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols, Certificateless one-pass and two-party authenticated key agreement protocol and its extensions, Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps, Identity-based authenticated key agreement protocol based on Weil pairing, Efficient identity-based authenticated key agreement protocol from pairings, The TLS handshake protocol: A modular analysis, Simulatable certificateless two-party authenticated key agreement protocol, A Provably Secure One-Pass Two-Party Key Establishment Protocol, A Modular Security Analysis of the TLS Handshake Protocol, Another look at HMQV, A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges, On the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groups, An improved identity-based key agreement protocol and its security proof, Доказательство защищенности протокола обмена ключами, Certificateless two-party authenticated key agreement scheme for smart grid, Towards Denial-of-Service-Resilient Key Agreement Protocols, An efficient and generic construction for Signal's handshake (X3DH): post-quantum, state leakage secure, and deniable, Characterization of Strongly Secure Authenticated Key Exchanges without NAXOS Technique, Analysis of the SSH Key Exchange Protocol, Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman Protocols, The GN-authenticated key agreement, Generic groups, collision resistance, and ECDSA, Unilaterally-Authenticated Key Exchange, Privacy-preserving authenticated key exchange for constrained devices