Modular Security Proofs for Key Agreement Protocols
From MaRDI portal
Publication:5451090
DOI10.1007/11593447_30zbMATH Open1154.94464OpenAlexW1481626015MaRDI QIDQ5451090FDOQ5451090
Authors: Caroline Kudla, Kenneth G. Paterson
Publication date: 18 March 2008
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11593447_30
Recommendations
Cited In (29)
- Analysis of the SSH key exchange protocol
- An efficient eCK secure identity based two party authenticated key agreement scheme with security against active adversaries
- Participant attack on three-party quantum key agreement with two-photon entanglement
- Simulatable certificateless two-party authenticated key agreement protocol
- A Modular Security Analysis of the TLS Handshake Protocol
- A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges
- The Twin Diffie-Hellman Problem and Applications
- A security proof for key exchange protocols
- Provable related-key security of contracting Feistel networks
- Information Security and Privacy
- Provably secure one-round identity-based authenticated asymmetric group key agreement protocol
- Nonce-Based Key Agreement Protocol Against Bad Randomness
- An improved identity-based key agreement protocol and its security proof
- A strengthened eCK secure identity based authenticated key agreement protocol based on the standard CDH assumption
- Mind the gap: modular machine-checked proofs of one-round key exchange protocols
- A formal security analysis of the Signal messaging protocol
- Strongly Secure Certificateless Key Agreement
- Asymmetric Group Key Agreement
- Improving the security of protocols of quantum key agreement solely using Bell states and Bell measurement
- The twin Diffie-Hellman problem and applications
- Security of Keyed Sponge Constructions Using a Modular Proof Approach
- The TLS handshake protocol: A modular analysis
- Provably secure and efficient certificateless authenticated tripartite key agreement protocol
- Tightly-secure authenticated key exchange, revisited
- Blake-Wilson, Johnson \& Menezes protocol revisited
- Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode
- Identity-based authenticated key agreement protocol based on Weil pairing
- A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols
- Automating Computational Proofs for Public-Key-Based Key Exchange
This page was built for publication: Modular Security Proofs for Key Agreement Protocols
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5451090)