HMQV: A High-Performance Secure Diffie-Hellman Protocol
From MaRDI portal
Publication:5451048
DOI10.1007/11535218_33zbMATH Open1145.94445DBLPconf/crypto/Krawczyk05OpenAlexW2117455301WikidataQ56475230 ScholiaQ56475230MaRDI QIDQ5451048FDOQ5451048
Authors: Hugo Krawczyk
Publication date: 17 March 2008
Published in: Advances in Cryptology – CRYPTO 2005 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11535218_33
Recommendations
Cited In (only showing first 100 items - show all)
- On the (in)security of the Diffie-Hellman oblivious PRF with multiplicative blinding
- Privacy-preserving authenticated key exchange and the case of IKEv2
- An efficient authenticated key exchange from random self-reducibility on CSIDH
- Practical isogeny-based key-exchange with optimal tightness
- Towards post-quantum security for signal's X3DH handshake
- A simple provably secure AKE from the LWE problem
- Certificateless public key encryption: a new generic construction and two pairing-free schemes
- Authenticated confidential channel establishment and the security of TLS-DHE
- Resource-aware protocols for authenticated group key exchange in integrated wired and wireless networks
- A secure and efficient authenticated Diffie-Hellman protocol
- Provably secure three-party password-based authenticated key exchange protocol
- On the Importance of Public-Key Validation in the MQV and HMQV Key Agreement Protocols
- On Forward Secrecy in One-Round Key Exchange
- On the separation between the FHMQV and HMQV protocols
- Authenticated key exchange and signatures with tight security in the standard model
- Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal
- Short variable length domain extenders with beyond birthday bound security
- Another look at automated theorem-proving
- State separation for code-based game-playing proofs
- Provably secure password authenticated key exchange based on RLWE for the post-quantum world
- An improved identity-based key agreement protocol and its security proof
- Non-interactive key exchange
- On weaknesses of the HDCP authentication and key exchange protocol and its repair
- A formal security analysis of the Signal messaging protocol
- Efficient One-Round Key Exchange in the Standard Model
- Strongly Secure Certificateless Key Agreement
- Full indifferentiable security of the XOR of two or more random permutations using the \(\chi^2\) method
- Randomized half-ideal cipher on groups with applications to UC (a)PAKE
- Decaf: eliminating cofactors through point compression
- On security analysis of an after-the-fact leakage resilient key exchange protocol
- Title not available (Why is that?)
- HMQV
- On the concrete security of TLS 1.3 PSK mode
- Authenticated Key Exchange and Key Encapsulation in the Standard Model
- A security weakness in Abdalla et al.'s generic construction of a group key exchange protocol
- Universally composable relaxed password authenticated key exchange
- KHAPE: Asymmetric PAKE from key-hiding key exchange
- CMQV+: an authenticated key exchange protocol from CMQV
- Cryptanalysis of a chaotic map-based password-authenticated key agreement protocol using smart cards
- On the security of the (F)HMQV protocol
- Generic authenticated key exchange in the quantum random oracle model
- Group key exchange protocols from supersingular isogenies
- Tightly-secure authenticated key exchange, revisited
- Another look at HMQV
- Extended KCI attack against two-party key establishment protocols
- Another look at tightness
- Blake-Wilson, Johnson \& Menezes protocol revisited
- Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS
- Strongly secure authenticated key exchange from factoring, codes, and lattices
- Taxonomical security consideration of authenticated key exchange resilient to intermediate computation leakage
- FORSAKES: a forward-secure authenticated key exchange protocol based on symmetric key-evolving schemes
- Symmetric Key Exchange with Full Forward Security and Robust Synchronization
- Two-pass authenticated key exchange with explicit authentication and tight security
- Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode
- A conference key distribution system
- Identity-based authenticated key agreement protocol based on Weil pairing
- Simple Security Definitions for and Constructions of 0-RTT Key Exchange
- Anonymity and one-way authentication in key exchange protocols
- A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols
- Certificateless one-pass and two-party authenticated key agreement protocol and its extensions
- Preserving privacy for free: efficient and provably secure two-factor authentication scheme with user anonymity
- A new framework for deniable secure key exchange
- sHMQV: an efficient key exchange protocol for power-limited devices
- Designing efficient authenticated key exchange resilient to leakage of ephemeral secret keys
- Strongly secure one round authenticated key exchange protocol with perfect forward security
- A New Key Exchange Protocol Based on MQV Assuming Public Computations
- About the Security of MTI/C0 and MQV
- 0-RTT key exchange with full forward secrecy
- Methodology for assessing the security of cryptographic protocols
- A modular security analysis of EAP and IEEE 802.11
- Short concurrent covert authenticated key exchange (short cAKE)
- Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness
- Post-quantum anonymous one-sided authenticated key exchange without random oracles
- Digital friend-or-foe authentication
- Post-quantum forward-secure onion routing (future anonymity in today's budget)
- On the Connection Between Signcryption and One-Pass Key Establishment
- On optimal tightness for key exchange with full forward secrecy via key confirmation
- A key manipulation attack on some recent isogeny-based key agreement protocols
- One-Round Attribute-Based Key Exchange in the Multi-Party Setting
- Post-quantum asynchronous deniable key exchange and the signal handshake
- TMQV: A Strongly eCK-Secure Diffie-Hellman Protocol without Gap Assumption
- Efficient public-key distance bounding protocol
- Towards Denial-of-Service-Resilient Key Agreement Protocols
- Modular Design of Role-Symmetric Authenticated Key Exchange Protocols
- Security analysis of the modular enhanced symmetric role authentication (mERA) protocol
- DSH: Deniable Secret Handshake Framework
- A Provably Secure One-Pass Two-Party Key Establishment Protocol
- An efficient and secure two-flow zero-knowledge identification protocol
- Fast Discretized Gaussian Sampling and Post-quantum TLS Ciphersuite
- Authenticated key exchange with entities from different settings and varied groups
- An efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniable
- Key encapsulation mechanism with tight enhanced security in the multi-user setting: impossibility result and optimal tightness
- Tighter security for generic authenticated key exchange in the QROM
- Unilaterally-authenticated key exchange
- On the cryptographic properties of algorithms accompanying the applications of standards GOST R 34.11-2012 and GOST R 34.10-2012
- Multi-user CDH problems and the concrete security of \(\mathsf{NAXOS}\) and \(\mathsf{X3DH}\)
- A Diffie-Hellman Key Exchange Protocol Without Random Oracles
- Improved attacks against key reuse in learning with errors key exchange
- \textsf{TOPAS} 2-pass key exchange with full perfect forward secrecy and optimal communication complexity
- The Cramer-Shoup Encryption Scheme Is Plaintext Aware in the Standard Model
This page was built for publication: HMQV: A High-Performance Secure Diffie-Hellman Protocol
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5451048)