On the Importance of Public-Key Validation in the MQV and HMQV Key Agreement Protocols
From MaRDI portal
Publication:5458271
DOI10.1007/11941378_11zbMATH Open1175.94092OpenAlexW1488807031WikidataQ57485796 ScholiaQ57485796MaRDI QIDQ5458271FDOQ5458271
Authors: Berkant Ustaoglu, Alfred Menezes
Publication date: 11 April 2008
Published in: Progress in Cryptology - INDOCRYPT 2006 (Search for Journal in Brave)
Full work available at URL: http://hdl.handle.net/11147/4782
Recommendations
Cited In (10)
- Methodology for assessing the security of cryptographic protocols
- On reusing ephemeral keys in Diffie-Hellman key agreement protocols
- Digital friend-or-foe authentication
- Provably secure three-party password-based authenticated key exchange protocol
- Lattice-Based Fault Attacks Against ECMQV
- Another look at automated theorem-proving
- Another look at HMQV
- Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS
- Decaf: Eliminating Cofactors Through Point Compression
- Designing efficient authenticated key exchange resilient to leakage of ephemeral secret keys
Uses Software
This page was built for publication: On the Importance of Public-Key Validation in the MQV and HMQV Key Agreement Protocols
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5458271)