Modular design of KEM-based authenticated key exchange
From MaRDI portal
Publication:6535501
Recommendations
Cites work
- scientific article; zbMATH DE number 1722690 (Why is no real title available?)
- scientific article; zbMATH DE number 1775427 (Why is no real title available?)
- A decade of lattice cryptography
- An introduction to number theory with cryptography
- Generic forward-secure key agreement without signatures
- HMQV: A High-Performance Secure Diffie-Hellman Protocol
- Hybrid key encapsulation mechanisms and authenticated key exchange
- Modular proofs for key exchange: rigorous optimizations in the Canetti-Krawczyk model
- More efficient post-quantum KEMTLS with pre-distributed public keys
- One-round key exchange with strong security: an efficient and generic construction in the standard model
- Provably secure password authenticated key exchange based on RLWE for the post-quantum world
- Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices
- Tightly-secure authenticated key exchange, revisited
Cited in
(2)
This page was built for publication: Modular design of KEM-based authenticated key exchange
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6535501)