scientific article; zbMATH DE number 1942418
From MaRDI portal
Publication:4409115
Recommendations
Cited in
(30)- Just fast keying
- Privacy-preserving authenticated key exchange and the case of IKEv2
- Analysis of the SSH key exchange protocol
- A modular security analysis of EAP and IEEE 802.11
- Authenticated confidential channel establishment and the security of TLS-DHE
- A Protocol for Secure Public Instant Messaging
- Security analysis and improvement of IKE protocol with signature authentication
- Post-quantum asynchronous deniable key exchange and the signal handshake
- A cryptographic analysis of the TLS 1.3 handshake protocol
- Security analysis of the modular enhanced symmetric role authentication (mERA) protocol
- An efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniable
- scientific article; zbMATH DE number 2080701 (Why is no real title available?)
- scientific article; zbMATH DE number 1722690 (Why is no real title available?)
- Comparing the pre- and post-specified peer models for key agreement
- Ideal key derivation and encryption in simulation-based security
- Universally Composable Security Analysis of TLS
- The TLS handshake protocol: A modular analysis
- Computational security analysis of the full EDHOC protocol
- An efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniable
- Considering two MAC under SIG variants of the basic SIGMA protocol
- Latke: a framework for constructing identity-binding PAKEs
- Advances in Cryptology - CRYPTO 2003
- Two-pass authenticated key exchange with explicit authentication and tight security
- Public Key Cryptography - PKC 2006
- Comparing the Pre- and Post-specified Peer Models for Key Agreement
- Anonymity and one-way authentication in key exchange protocols
- Tighter proofs for the SIGMA and TLS 1.3 key exchange protocols
- Information Security and Privacy
- Breaking and fixing public-key Kerberos
- Towards a provably secure DoS-resilient key exchange protocol with perfect forward secrecy
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4409115)