HMQV

From MaRDI portal
Software:15253



swMATH2714MaRDI QIDQ15253


No author found.





Related Items (95)

A key manipulation attack on some recent isogeny-based key agreement protocolsAnother Look at TightnessAn efficient authenticated key exchange from random self-reducibility on CSIDHTowards post-quantum security for signal's X3DH handshakePractical isogeny-based key-exchange with optimal tightnessA strongly secure identity-based authenticated group key exchange protocolAn efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniableStrongly Secure Authenticated Key Exchange from Factoring, Codes, and LatticesAuthenticated key exchange and signatures with tight security in the standard modelKHAPE: Asymmetric PAKE from key-hiding key exchangeFast Discretized Gaussian Sampling and Post-quantum TLS CiphersuiteDecaf: Eliminating Cofactors Through Point CompressionImproved attacks against key reuse in learning with errors key exchangeMore efficient post-quantum KEMTLS with pre-distributed public keysPerfect forward secure identity-based authenticated key agreement protocol in the escrow modeLeakage-Resilient Public-Key Cryptography in the Bounded-Retrieval ModelBlake-Wilson, Johnson \& Menezes protocol revisitedAsymmetric PAKE with low computation \textit{and} communicationOn the concrete security of TLS 1.3 PSK modeStrengthening the security of authenticated key exchange against bad randomnessA new framework for deniable secure key exchangeOn security analysis of an after-the-fact leakage resilient key exchange protocolAuthenticated Key Exchange and Key Encapsulation in the Standard ModelEfficient Public-Key Distance Bounding ProtocolOne-Round Attribute-Based Key Exchange in the Multi-party SettingA security weakness in Abdalla et al.'s generic construction of a group key exchange protocolStronger Security of Authenticated Key ExchangeFORSAKES: a forward-secure authenticated key exchange protocol based on symmetric key-evolving schemesStrongly-Secure Identity-Based Key Agreement and Anonymous ExtensionCertificateless public key encryption: a new generic construction and two pairing-free schemesAnonymity and one-way authentication in key exchange protocolsExtended KCI attack against two-party key establishment protocolsAuthenticated confidential channel establishment and the security of TLS-DHESession-StateReveal is stronger than eCKs EphemeralKeyReveal: using automatic analysis to attack the NAXOS protocolOn reusing ephemeral keys in Diffie-Hellman key agreement protocolsTwo-pass authenticated key exchange with explicit authentication and tight securityOne-Round Attribute-Based Key Exchange in the Multi-Party SettingCMQV+: an authenticated key exchange protocol from CMQVProvably Secure Password Authenticated Key Exchange Based on RLWE for the Post-Quantum WorldA formal security analysis of the Signal messaging protocolAbout the Security of MTI/C0 and MQVA New Key Exchange Protocol Based on MQV Assuming Public ComputationsResource-aware protocols for authenticated group key exchange in integrated wired and wireless networksBeyond eCK: perfect forward secrecy under actor compromise and ephemeral-key revealHighly-Efficient Universally-Composable Commitments Based on the DDH AssumptionCryptanalysis of a chaotic map-based password-authenticated key agreement protocol using smart cardsStrongly secure authenticated key exchange from factoring, codes, and latticesО криптографических свойствах алгоритмов, сопутствующих применению стандартов ГОСТ Р 34.11-2012 и ГОСТ Р 34.10-2012A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocolsCertificateless one-pass and two-party authenticated key agreement protocol and its extensionsPreserving privacy for free: efficient and provably secure two-factor authentication scheme with user anonymityA simple provably secure AKE from the LWE problemA Modular Security Analysis of EAP and IEEE 802.11Cryptographic Extraction and Key Derivation: The HKDF SchemeDegrees of Security: Protocol Guarantees in the Face of Compromising AdversariesA New Security Model for Authenticated Key AgreementThe Cramer-Shoup Encryption Scheme Is Plaintext Aware in the Standard Model(Password) Authenticated Key Establishment: From 2-Party to GroupMaking the Diffie-Hellman Protocol Identity-BasedA Provably Secure One-Pass Two-Party Key Establishment ProtocolAnother look at HMQVGeneric Compilers for Authenticated Key ExchangeOn the Connection Between Signcryption and One-Pass Key EstablishmentErrors in Computational Complexity Proofs for ProtocolsConstant-Round Authenticated Group Key Exchange with Logarithmic Computation ComplexitySecuring group key exchange against strong corruptions and key registration attacksModeling Key Compromise Impersonation Attacks on Group Key Exchange ProtocolsSecurity Analysis of the Modular Enhanced Symmetric Role Authentication (mERA) ProtocolOn the Importance of Public-Key Validation in the MQV and HMQV Key Agreement ProtocolsDesigning Efficient Authenticated Key Exchange Resilient to Leakage of Ephemeral Secret KeysAn improved identity-based key agreement protocol and its security proofObtaining a secure and efficient key agreement protocol from (H)MQV and NAXOSComputer securityOne-Pass HMQV and Asymmetric Key-WrappingOne-round key exchange in the standard modelTowards Denial-of-Service-Resilient Key Agreement ProtocolsGroup key exchange protocols from supersingular isogeniesPassword-Authenticated Group Key Agreement with Adaptive Security and ContributivenessTaxonomical Security Consideration of Authenticated Key Exchange Resilient to Intermediate Computation LeakageTMQV: A Strongly eCK-Secure Diffie-Hellman Protocol without Gap AssumptionStrongly Secure One Round Authenticated Key Exchange Protocol with Perfect Forward SecurityStrongly Secure Certificateless Key AgreementThe Whole is Less Than the Sum of Its Parts: Constructing More Efficient Lattice-Based AKEsCharacterization of Strongly Secure Authenticated Key Exchanges without NAXOS TechniquePublic Key Cryptography - PKC 2006A Framework for Practical Universally Composable Zero-Knowledge ProtocolsAn eCK-Secure Authenticated Key Exchange Protocol without Random OraclesComparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman ProtocolsA Study of Two-Party Certificateless Authenticated Key-Agreement ProtocolsEfficient Constructions of Signcryption Schemes and Signcryption ComposabilityProgress in Cryptology – Mycrypt 2005Progress in Cryptology – Mycrypt 2005Universally composable relaxed password authenticated key exchangeUnnamed Item0-RTT Key Exchange with Full Forward Secrecy


This page was built for software: HMQV