HMQV: A High-Performance Secure Diffie-Hellman Protocol
From MaRDI portal
Publication:5451048
Recommendations
Cited in
(only showing first 100 items - show all)- Short variable length domain extenders with beyond birthday bound security
- Resource-aware protocols for authenticated group key exchange in integrated wired and wireless networks
- Cryptanalysis of a chaotic map-based password-authenticated key agreement protocol using smart cards
- Efficient One-Round Key Exchange in the Standard Model
- Strongly secure authenticated key exchange from factoring, codes, and lattices
- Provably secure password authenticated key exchange based on RLWE for the post-quantum world
- Preserving privacy for free: efficient and provably secure two-factor authentication scheme with user anonymity
- On security analysis of an after-the-fact leakage resilient key exchange protocol
- An improved identity-based key agreement protocol and its security proof
- An efficient authenticated key exchange from random self-reducibility on CSIDH
- Practical isogeny-based key-exchange with optimal tightness
- Towards post-quantum security for signal's X3DH handshake
- On the concrete security of TLS 1.3 PSK mode
- scientific article; zbMATH DE number 1942418 (Why is no real title available?)
- Taxonomical security consideration of authenticated key exchange resilient to intermediate computation leakage
- On the separation between the FHMQV and HMQV protocols
- Designing efficient authenticated key exchange resilient to leakage of ephemeral secret keys
- KHAPE: Asymmetric PAKE from key-hiding key exchange
- Tightly-secure authenticated key exchange, revisited
- On the security of the (F)HMQV protocol
- Authenticated Key Exchange and Key Encapsulation in the Standard Model
- Identity-based authenticated key agreement protocol based on Weil pairing
- Provably secure three-party password-based authenticated key exchange protocol
- A security weakness in Abdalla et al.'s generic construction of a group key exchange protocol
- FORSAKES: a forward-secure authenticated key exchange protocol based on symmetric key-evolving schemes
- A simple provably secure AKE from the LWE problem
- Authenticated key exchange and signatures with tight security in the standard model
- Generic authenticated key exchange in the quantum random oracle model
- Simple Security Definitions for and Constructions of 0-RTT Key Exchange
- Group key exchange protocols from supersingular isogenies
- Non-interactive key exchange
- On the (in)security of the Diffie-Hellman oblivious PRF with multiplicative blinding
- Two-pass authenticated key exchange with explicit authentication and tight security
- A secure and efficient authenticated Diffie-Hellman protocol
- Blake-Wilson, Johnson \& Menezes protocol revisited
- Another look at tightness
- On weaknesses of the HDCP authentication and key exchange protocol and its repair
- A New Key Exchange Protocol Based on MQV Assuming Public Computations
- A new framework for deniable secure key exchange
- Anonymity and one-way authentication in key exchange protocols
- Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS
- Another look at automated theorem-proving
- HMQV
- CMQV+: an authenticated key exchange protocol from CMQV
- On the Importance of Public-Key Validation in the MQV and HMQV Key Agreement Protocols
- About the Security of MTI/C0 and MQV
- Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal
- Full indifferentiable security of the XOR of two or more random permutations using the \(\chi^2\) method
- Randomized half-ideal cipher on groups with applications to UC (a)PAKE
- Another look at HMQV
- 0-RTT key exchange with full forward secrecy
- State separation for code-based game-playing proofs
- sHMQV: an efficient key exchange protocol for power-limited devices
- Decaf: eliminating cofactors through point compression
- A formal security analysis of the Signal messaging protocol
- Extended KCI attack against two-party key establishment protocols
- Strongly secure one round authenticated key exchange protocol with perfect forward security
- Strongly Secure Certificateless Key Agreement
- Privacy-preserving authenticated key exchange and the case of IKEv2
- Authenticated confidential channel establishment and the security of TLS-DHE
- Universally composable relaxed password authenticated key exchange
- Symmetric Key Exchange with Full Forward Security and Robust Synchronization
- Certificateless public key encryption: a new generic construction and two pairing-free schemes
- A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols
- Certificateless one-pass and two-party authenticated key agreement protocol and its extensions
- On Forward Secrecy in One-Round Key Exchange
- A conference key distribution system
- Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode
- On the cryptographic properties of algorithms accompanying the applications of standards GOST R 34.11-2012 and GOST R 34.10-2012
- On optimal tightness for key exchange with full forward secrecy via key confirmation
- Efficient public-key distance bounding protocol
- Fast Discretized Gaussian Sampling and Post-quantum TLS Ciphersuite
- Characterization of strongly secure authenticated key exchanges without NAXOS technique
- Analysis of the insecurity of ECMQV with partially known nonces
- Post-quantum asynchronous deniable key exchange and the signal handshake
- Modular Design of Role-Symmetric Authenticated Key Exchange Protocols
- A key manipulation attack on some recent isogeny-based key agreement protocols
- Towards secure asynchronous messaging with forward secrecy and mutual authentication
- Authenticated key exchange with entities from different settings and varied groups
- Making an asymmetric PAKE quantum-annoying by hiding group elements
- Security analysis of the modular enhanced symmetric role authentication (mERA) protocol
- Two-message authenticated key exchange from public-key encryption
- Methodology for assessing the security of cryptographic protocols
- Post-quantum cryptography for healthcare: a number theory based two-factor mutual authentication and key exchange protocol over lattices for TMIS
- Tighter security for generic authenticated key exchange in the QROM
- Latke: a framework for constructing identity-binding PAKEs
- One-round attribute-based key exchange in the multi-party setting
- Complete decomposition of dihedral groups with application to key exchange protocol
- \textsf{TOPAS} 2-pass key exchange with full perfect forward secrecy and optimal communication complexity
- An efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniable
- DSH: Deniable Secret Handshake Framework
- A modular security analysis of EAP and IEEE 802.11
- Digital friend-or-foe authentication
- More efficient post-quantum KEMTLS with pre-distributed public keys
- An efficient and secure two-flow zero-knowledge identification protocol
- A Provably Secure One-Pass Two-Party Key Establishment Protocol
- Multi-user CDH problems and the concrete security of \(\mathsf{NAXOS}\) and \(\mathsf{X3DH}\)
- Modular design of KEM-based authenticated key exchange
- One-pass HMQV and asymmetric key-wrapping
- Strengthening the security of authenticated key exchange against bad randomness
This page was built for publication: HMQV: A High-Performance Secure Diffie-Hellman Protocol
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5451048)