Examining Indistinguishability-Based Proof Models for Key Establishment Protocols
From MaRDI portal
Publication:5451092
DOI10.1007/11593447_32zbMath1154.94382OpenAlexW2121226752MaRDI QIDQ5451092
Kim-Kwang Raymond Choo, Yvonne Hitchcock, Colin A. Boyd
Publication date: 18 March 2008
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11593447_32
Related Items
Security weakness in a three-party pairing-based protocol for password authenticated key exchange, Strong authenticated key exchange with auxiliary inputs, Strengthening the security of authenticated key exchange against bad randomness, A novel pairing-free certificateless authenticated key agreement protocol with provable security, Security of a Leakage-Resilient Protocol for Key Establishment and Mutual Authentication, FORSAKES: a forward-secure authenticated key exchange protocol based on symmetric key-evolving schemes, Traceable Privacy of Recent Provably-Secure RFID Protocols, Authenticated confidential channel establishment and the security of TLS-DHE, Cryptanalysis of simple three-party key exchange protocol (S-3PAKE), Key Establishment Using Signcryption Techniques, Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal, A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols, A simple provably secure AKE from the LWE problem, Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol, The TLS handshake protocol: A modular analysis, A Modular Security Analysis of the TLS Handshake Protocol, Strongly secure identity-based authenticated key agreement protocols without bilinear pairings, Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS, Analysis of the SSH Key Exchange Protocol, Efficient and Strongly Secure Password-Based Server Aided Key Exchange (Extended Abstract), Strongly leakage resilient authenticated key exchange, revisited