scientific article; zbMATH DE number 1942418
From MaRDI portal
Publication:4409115
zbMATH Open1026.94524MaRDI QIDQ4409115FDOQ4409115
Authors: Ran Canetti, Hugo Krawczyk
Publication date: 30 June 2003
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2442/24420143.htm
Title of this publication is not available (Why is that?)
Recommendations
Cited In (30)
- Just fast keying
- Privacy-preserving authenticated key exchange and the case of IKEv2
- Analysis of the SSH key exchange protocol
- A modular security analysis of EAP and IEEE 802.11
- Authenticated confidential channel establishment and the security of TLS-DHE
- A Protocol for Secure Public Instant Messaging
- Post-quantum asynchronous deniable key exchange and the signal handshake
- Security analysis and improvement of IKE protocol with signature authentication
- A cryptographic analysis of the TLS 1.3 handshake protocol
- Security analysis of the modular enhanced symmetric role authentication (mERA) protocol
- An efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniable
- Title not available (Why is that?)
- Title not available (Why is that?)
- Comparing the pre- and post-specified peer models for key agreement
- Ideal key derivation and encryption in simulation-based security
- Universally Composable Security Analysis of TLS
- The TLS handshake protocol: A modular analysis
- Computational security analysis of the full EDHOC protocol
- Latke: a framework for constructing identity-binding PAKEs
- Considering two MAC under SIG variants of the basic SIGMA protocol
- An efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniable
- Advances in Cryptology - CRYPTO 2003
- Public Key Cryptography - PKC 2006
- Two-pass authenticated key exchange with explicit authentication and tight security
- Comparing the Pre- and Post-specified Peer Models for Key Agreement
- Anonymity and one-way authentication in key exchange protocols
- Tighter proofs for the SIGMA and TLS 1.3 key exchange protocols
- Information Security and Privacy
- Towards a provably secure DoS-resilient key exchange protocol with perfect forward secrecy
- Breaking and fixing public-key Kerberos
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4409115)