Modular Security Proofs for Key Agreement Protocols
From MaRDI portal
Publication:5451090
Recommendations
Cited in
(29)- Analysis of the SSH key exchange protocol
- Participant attack on three-party quantum key agreement with two-photon entanglement
- An efficient eCK secure identity based two party authenticated key agreement scheme with security against active adversaries
- Simulatable certificateless two-party authenticated key agreement protocol
- A Modular Security Analysis of the TLS Handshake Protocol
- A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges
- A security proof for key exchange protocols
- The Twin Diffie-Hellman Problem and Applications
- Provable related-key security of contracting Feistel networks
- Provably secure one-round identity-based authenticated asymmetric group key agreement protocol
- Information Security and Privacy
- An improved identity-based key agreement protocol and its security proof
- Nonce-Based Key Agreement Protocol Against Bad Randomness
- A formal security analysis of the Signal messaging protocol
- Mind the gap: modular machine-checked proofs of one-round key exchange protocols
- A strengthened eCK secure identity based authenticated key agreement protocol based on the standard CDH assumption
- Strongly Secure Certificateless Key Agreement
- Improving the security of protocols of quantum key agreement solely using Bell states and Bell measurement
- Asymmetric Group Key Agreement
- The twin Diffie-Hellman problem and applications
- Security of Keyed Sponge Constructions Using a Modular Proof Approach
- The TLS handshake protocol: A modular analysis
- Provably secure and efficient certificateless authenticated tripartite key agreement protocol
- Tightly-secure authenticated key exchange, revisited
- Blake-Wilson, Johnson \& Menezes protocol revisited
- Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode
- A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols
- Identity-based authenticated key agreement protocol based on Weil pairing
- Automating Computational Proofs for Public-Key-Based Key Exchange
This page was built for publication: Modular Security Proofs for Key Agreement Protocols
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5451090)