FORSAKES: a forward-secure authenticated key exchange protocol based on symmetric key-evolving schemes
From MaRDI portal
Publication:895004
DOI10.3934/amc.2015.9.471zbMath1366.94551OpenAlexW2398609434MaRDI QIDQ895004
Rasool Jalili, Mohammad Sadeq Dousti
Publication date: 25 November 2015
Published in: Advances in Mathematics of Communications (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.3934/amc.2015.9.471
security modelprovable securityforward securityauthenticated key exchange protocolkey evolving schemes
Cryptography (94A60) Network protocols (68M12) Authentication, digital signatures and secret sharing (94A62)
Related Items (3)
Comparison analysis of Ding's RLWE-based key exchange protocol and NewHope variants ⋮ Symmetric Key Exchange with Full Forward Security and Robust Synchronization ⋮ FORSAKES
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- On the security of recent protocols
- Secure key establishment
- Zero-knowledge proofs of identity
- An efficient protocol for authenticated key agreement
- Protocols for authentification and key establishment
- A forward-secure public-key encryption scheme
- An efficient statistical zero-knowledge authentication protocol for smart cards
- Session Key Distribution Using Smart Cards
- The Exact Security of Digital Signatures-How to Sign with RSA and Rabin
- Provably Repairing the ISO/IEC 9798 Standard for Entity Authentication
- Pseudorandom Functions and Lattices
- Taxonomical Security Consideration of Authenticated Key Exchange Resilient to Intermediate Computation Leakage
- Keying Hash Functions for Message Authentication
- Stronger Security of Authenticated Key Exchange
- A New Security Model for Authenticated Key Agreement
- New directions in cryptography
- Using encryption for authentication in large networks of computers
- Key agreement protocols and their security analysis
- Initiator-Resilient Universally Composable Key Exchange
- Universally Composable Password-Based Key Exchange
- Another look at HMQV
- HMQV: A High-Performance Secure Diffie-Hellman Protocol
- Examining Indistinguishability-Based Proof Models for Key Establishment Protocols
- Security in Communication Networks
- Fast Software Encryption
- Selected Areas in Cryptography
This page was built for publication: FORSAKES: a forward-secure authenticated key exchange protocol based on symmetric key-evolving schemes