scientific article; zbMATH DE number 1942418
From MaRDI portal
Publication:4409115
zbMath1026.94524MaRDI QIDQ4409115
Publication date: 30 June 2003
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2442/24420143.htm
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items
An efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniable, Post-quantum asynchronous deniable key exchange and the signal handshake, Anonymity and one-way authentication in key exchange protocols, Authenticated confidential channel establishment and the security of TLS-DHE, Two-pass authenticated key exchange with explicit authentication and tight security, A cryptographic analysis of the TLS 1.3 handshake protocol, Breaking and fixing public-key Kerberos, A Modular Security Analysis of EAP and IEEE 802.11, The TLS handshake protocol: A modular analysis, Security Analysis of the Modular Enhanced Symmetric Role Authentication (mERA) Protocol, Ideal Key Derivation and Encryption in Simulation-Based Security, Considering two MAC under SIG variants of the basic SIGMA protocol, Privacy-preserving authenticated key exchange and the case of IKEv2, An efficient and generic construction for Signal's handshake (X3DH): post-quantum, state leakage secure, and deniable, Towards a Provably Secure DoS-Resilient Key Exchange Protocol with Perfect Forward Secrecy, Universally Composable Security Analysis of TLS, Tighter proofs for the SIGMA and TLS 1.3 key exchange protocols