On the Importance of Public-Key Validation in the MQV and HMQV Key Agreement Protocols
From MaRDI portal
Publication:5458271
Recommendations
Cited in
(12)- Methodology for assessing the security of cryptographic protocols
- On reusing ephemeral keys in Diffie-Hellman key agreement protocols
- Digital friend-or-foe authentication
- Provably secure three-party password-based authenticated key exchange protocol
- On the separation between the FHMQV and HMQV protocols
- Another look at automated theorem-proving
- Decaf: eliminating cofactors through point compression
- On the security of the (F)HMQV protocol
- Another look at HMQV
- Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS
- Lattice-based fault attacks against ECMQV
- Designing efficient authenticated key exchange resilient to leakage of ephemeral secret keys
This page was built for publication: On the Importance of Public-Key Validation in the MQV and HMQV Key Agreement Protocols
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5458271)