Applied Cryptography and Network Security
From MaRDI portal
Publication:4680940
Recommendations
Cited in
(15)- Authentification ranks with identities based on elliptic curves
- On the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groups
- Efficient One-Round Key Exchange in the Standard Model
- Key agreement via protocols
- Towards tight adaptive security of non-interactive key exchange
- One-round identity-based key exchange with perfect forward security
- An improved two-party identity-based authenticated key agreement protocol using pairings
- Non-interactive key exchange
- Provably secure identity-based authenticated key agreement protocols with malicious private key generators
- A Provably Secure One-Pass Two-Party Key Establishment Protocol
- Reusing static keys in key agreement protocols
- An efficient dynamic authenticated key exchange protocol with selectable identities
- Modular proofs for key exchange: rigorous optimizations in the Canetti-Krawczyk model
- Authenticated commutator key agreement protocol
- On the multi-user security of LWE-based NIKE
This page was built for publication: Applied Cryptography and Network Security
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4680940)