Applied Cryptography and Network Security
From MaRDI portal
Publication:4680938
Recommendations
- Strongly secure one round authenticated key exchange protocol with perfect forward security
- On Forward Secrecy in One-Round Key Exchange
- One-round key exchange in the standard model
- One-round key exchange with strong security: an efficient and generic construction in the standard model
- Information Security and Cryptology - ICISC 2005
Cited in
(19)- scientific article; zbMATH DE number 1643939 (Why is no real title available?)
- One-Round Attribute-Based Key Exchange in the Multi-Party Setting
- Provably secure three-party password-based authenticated key exchange protocol
- One-round key exchange with strong security: an efficient and generic construction in the standard model
- On Forward Secrecy in One-Round Key Exchange
- A Provably Secure One-Pass Two-Party Key Establishment Protocol
- Modular Design of Role-Symmetric Authenticated Key Exchange Protocols
- Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal
- Efficient One-Round Key Exchange in the Standard Model
- Unilaterally-authenticated key exchange
- Zero round-trip time for the extended access control protocol
- One-Round Cross-Domain Group Key Exchange Protocol in the Standard Model
- Comment on a certificateless one-pass and two-party authenticated key agreement protocol
- Strongly secure authenticated key exchange from factoring, codes, and lattices
- One-round key exchange in the standard model
- Anonymity and one-way authentication in key exchange protocols
- A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols
- Round-optimal password-based authenticated key exchange
- Strongly secure one round authenticated key exchange protocol with perfect forward security
This page was built for publication: Applied Cryptography and Network Security
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4680938)