HMQV
From MaRDI portal
Software:15253
No author found.
Related Items (95)
A key manipulation attack on some recent isogeny-based key agreement protocols ⋮ Another Look at Tightness ⋮ An efficient authenticated key exchange from random self-reducibility on CSIDH ⋮ Towards post-quantum security for signal's X3DH handshake ⋮ Practical isogeny-based key-exchange with optimal tightness ⋮ A strongly secure identity-based authenticated group key exchange protocol ⋮ An efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniable ⋮ Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices ⋮ Authenticated key exchange and signatures with tight security in the standard model ⋮ KHAPE: Asymmetric PAKE from key-hiding key exchange ⋮ Fast Discretized Gaussian Sampling and Post-quantum TLS Ciphersuite ⋮ Decaf: Eliminating Cofactors Through Point Compression ⋮ Improved attacks against key reuse in learning with errors key exchange ⋮ More efficient post-quantum KEMTLS with pre-distributed public keys ⋮ Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode ⋮ Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model ⋮ Blake-Wilson, Johnson \& Menezes protocol revisited ⋮ Asymmetric PAKE with low computation \textit{and} communication ⋮ On the concrete security of TLS 1.3 PSK mode ⋮ Strengthening the security of authenticated key exchange against bad randomness ⋮ A new framework for deniable secure key exchange ⋮ On security analysis of an after-the-fact leakage resilient key exchange protocol ⋮ Authenticated Key Exchange and Key Encapsulation in the Standard Model ⋮ Efficient Public-Key Distance Bounding Protocol ⋮ One-Round Attribute-Based Key Exchange in the Multi-party Setting ⋮ A security weakness in Abdalla et al.'s generic construction of a group key exchange protocol ⋮ Stronger Security of Authenticated Key Exchange ⋮ FORSAKES: a forward-secure authenticated key exchange protocol based on symmetric key-evolving schemes ⋮ Strongly-Secure Identity-Based Key Agreement and Anonymous Extension ⋮ Certificateless public key encryption: a new generic construction and two pairing-free schemes ⋮ Anonymity and one-way authentication in key exchange protocols ⋮ Extended KCI attack against two-party key establishment protocols ⋮ Authenticated confidential channel establishment and the security of TLS-DHE ⋮ Session-StateReveal is stronger than eCKs EphemeralKeyReveal: using automatic analysis to attack the NAXOS protocol ⋮ On reusing ephemeral keys in Diffie-Hellman key agreement protocols ⋮ Two-pass authenticated key exchange with explicit authentication and tight security ⋮ One-Round Attribute-Based Key Exchange in the Multi-Party Setting ⋮ CMQV+: an authenticated key exchange protocol from CMQV ⋮ Provably Secure Password Authenticated Key Exchange Based on RLWE for the Post-Quantum World ⋮ A formal security analysis of the Signal messaging protocol ⋮ About the Security of MTI/C0 and MQV ⋮ A New Key Exchange Protocol Based on MQV Assuming Public Computations ⋮ Resource-aware protocols for authenticated group key exchange in integrated wired and wireless networks ⋮ Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal ⋮ Highly-Efficient Universally-Composable Commitments Based on the DDH Assumption ⋮ Cryptanalysis of a chaotic map-based password-authenticated key agreement protocol using smart cards ⋮ Strongly secure authenticated key exchange from factoring, codes, and lattices ⋮ О криптографических свойствах алгоритмов, сопутствующих применению стандартов ГОСТ Р 34.11-2012 и ГОСТ Р 34.10-2012 ⋮ A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols ⋮ Certificateless one-pass and two-party authenticated key agreement protocol and its extensions ⋮ Preserving privacy for free: efficient and provably secure two-factor authentication scheme with user anonymity ⋮ A simple provably secure AKE from the LWE problem ⋮ A Modular Security Analysis of EAP and IEEE 802.11 ⋮ Cryptographic Extraction and Key Derivation: The HKDF Scheme ⋮ Degrees of Security: Protocol Guarantees in the Face of Compromising Adversaries ⋮ A New Security Model for Authenticated Key Agreement ⋮ The Cramer-Shoup Encryption Scheme Is Plaintext Aware in the Standard Model ⋮ (Password) Authenticated Key Establishment: From 2-Party to Group ⋮ Making the Diffie-Hellman Protocol Identity-Based ⋮ A Provably Secure One-Pass Two-Party Key Establishment Protocol ⋮ Another look at HMQV ⋮ Generic Compilers for Authenticated Key Exchange ⋮ On the Connection Between Signcryption and One-Pass Key Establishment ⋮ Errors in Computational Complexity Proofs for Protocols ⋮ Constant-Round Authenticated Group Key Exchange with Logarithmic Computation Complexity ⋮ Securing group key exchange against strong corruptions and key registration attacks ⋮ Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols ⋮ Security Analysis of the Modular Enhanced Symmetric Role Authentication (mERA) Protocol ⋮ On the Importance of Public-Key Validation in the MQV and HMQV Key Agreement Protocols ⋮ Designing Efficient Authenticated Key Exchange Resilient to Leakage of Ephemeral Secret Keys ⋮ An improved identity-based key agreement protocol and its security proof ⋮ Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS ⋮ Computer security ⋮ One-Pass HMQV and Asymmetric Key-Wrapping ⋮ One-round key exchange in the standard model ⋮ Towards Denial-of-Service-Resilient Key Agreement Protocols ⋮ Group key exchange protocols from supersingular isogenies ⋮ Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness ⋮ Taxonomical Security Consideration of Authenticated Key Exchange Resilient to Intermediate Computation Leakage ⋮ TMQV: A Strongly eCK-Secure Diffie-Hellman Protocol without Gap Assumption ⋮ Strongly Secure One Round Authenticated Key Exchange Protocol with Perfect Forward Security ⋮ Strongly Secure Certificateless Key Agreement ⋮ The Whole is Less Than the Sum of Its Parts: Constructing More Efficient Lattice-Based AKEs ⋮ Characterization of Strongly Secure Authenticated Key Exchanges without NAXOS Technique ⋮ Public Key Cryptography - PKC 2006 ⋮ A Framework for Practical Universally Composable Zero-Knowledge Protocols ⋮ An eCK-Secure Authenticated Key Exchange Protocol without Random Oracles ⋮ Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman Protocols ⋮ A Study of Two-Party Certificateless Authenticated Key-Agreement Protocols ⋮ Efficient Constructions of Signcryption Schemes and Signcryption Composability ⋮ Progress in Cryptology – Mycrypt 2005 ⋮ Progress in Cryptology – Mycrypt 2005 ⋮ Universally composable relaxed password authenticated key exchange ⋮ Unnamed Item ⋮ 0-RTT Key Exchange with Full Forward Secrecy
This page was built for software: HMQV