Applied Cryptography and Network Security
From MaRDI portal
Publication:4680938
DOI10.1007/B98360zbMATH Open1103.68520OpenAlexW4301861138MaRDI QIDQ4680938FDOQ4680938
Authors:
Publication date: 13 June 2005
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b98360
Recommendations
- Strongly secure one round authenticated key exchange protocol with perfect forward security
- On Forward Secrecy in One-Round Key Exchange
- One-round key exchange in the standard model
- One-round key exchange with strong security: an efficient and generic construction in the standard model
- Information Security and Cryptology - ICISC 2005
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Authentication, digital signatures and secret sharing (94A62)
Cited In (19)
- Title not available (Why is that?)
- One-Round Attribute-Based Key Exchange in the Multi-Party Setting
- One-round key exchange with strong security: an efficient and generic construction in the standard model
- Provably secure three-party password-based authenticated key exchange protocol
- On Forward Secrecy in One-Round Key Exchange
- Modular Design of Role-Symmetric Authenticated Key Exchange Protocols
- A Provably Secure One-Pass Two-Party Key Establishment Protocol
- Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal
- Unilaterally-authenticated key exchange
- Efficient One-Round Key Exchange in the Standard Model
- Zero round-trip time for the extended access control protocol
- One-Round Cross-Domain Group Key Exchange Protocol in the Standard Model
- Comment on a certificateless one-pass and two-party authenticated key agreement protocol
- Strongly secure authenticated key exchange from factoring, codes, and lattices
- One-round key exchange in the standard model
- Anonymity and one-way authentication in key exchange protocols
- A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols
- Round-optimal password-based authenticated key exchange
- Strongly secure one round authenticated key exchange protocol with perfect forward security
This page was built for publication: Applied Cryptography and Network Security
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4680938)