Examining Indistinguishability-Based Proof Models for Key Establishment Protocols
From MaRDI portal
Publication:5451092
DOI10.1007/11593447_32zbMATH Open1154.94382OpenAlexW2121226752MaRDI QIDQ5451092FDOQ5451092
Authors: Kim-Kwang Raymond Choo, Yvonne Hitchcock, Colin A. Boyd
Publication date: 18 March 2008
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11593447_32
Recommendations
Cited In (23)
- A novel pairing-free certificateless authenticated key agreement protocol with provable security
- Analysis of the SSH key exchange protocol
- A simple provably secure AKE from the LWE problem
- Security of a Leakage-Resilient Protocol for Key Establishment and Mutual Authentication
- Authenticated confidential channel establishment and the security of TLS-DHE
- A Modular Security Analysis of the TLS Handshake Protocol
- Cryptanalysis of simple three-party key exchange protocol (S-3PAKE)
- Strong authenticated key exchange with auxiliary inputs
- Efficient and Strongly Secure Password-Based Server Aided Key Exchange (Extended Abstract)
- Traceable Privacy of Recent Provably-Secure RFID Protocols
- Progress in Cryptology – Mycrypt 2005
- Information Security and Privacy
- Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal
- Security weakness in a three-party pairing-based protocol for password authenticated key exchange
- Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol
- Strongly secure identity-based authenticated key agreement protocols without bilinear pairings
- The TLS handshake protocol: A modular analysis
- Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS
- Key Establishment Using Signcryption Techniques
- FORSAKES: a forward-secure authenticated key exchange protocol based on symmetric key-evolving schemes
- Strengthening the security of authenticated key exchange against bad randomness
- Strongly leakage resilient authenticated key exchange, revisited
- A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols
This page was built for publication: Examining Indistinguishability-Based Proof Models for Key Establishment Protocols
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5451092)