Public Key Cryptography - PKC 2006
From MaRDI portal
Publication:5898956
DOI10.1007/11745853zbMath1151.94532OpenAlexW4205680410MaRDI QIDQ5898956
Kristin E. Lauter, Anton Mityagin
Publication date: 2 May 2007
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11745853
Related Items
Practical isogeny-based key-exchange with optimal tightness, Secret Key Generation Using OFDM Samples, Blake-Wilson, Johnson \& Menezes protocol revisited, Efficient Public-Key Distance Bounding Protocol, CMQV+: an authenticated key exchange protocol from CMQV, On weaknesses of the HDCP authentication and key exchange protocol and its repair, Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal, A Provably Secure One-Pass Two-Party Key Establishment Protocol, Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS, Limonnitsa: making Limonnik-3 post-quantum, Tightly-secure authenticated key exchange, revisited, Taxonomical Security Consideration of Authenticated Key Exchange Resilient to Intermediate Computation Leakage, Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman Protocols
Uses Software