HMQV
From MaRDI portal
Software:15253
swMATH2714MaRDI QIDQ15253FDOQ15253
Author name not available (Why is that?)
Cited In (95)
- Efficient Constructions of Signcryption Schemes and Signcryption Composability
- Taxonomical Security Consideration of Authenticated Key Exchange Resilient to Intermediate Computation Leakage
- An efficient authenticated key exchange from random self-reducibility on CSIDH
- Practical isogeny-based key-exchange with optimal tightness
- Towards post-quantum security for signal's X3DH handshake
- A simple provably secure AKE from the LWE problem
- Highly-Efficient Universally-Composable Commitments Based on the DDH Assumption
- Certificateless public key encryption: a new generic construction and two pairing-free schemes
- A key manipulation attack on some recent isogeny-based key agreement protocols
- Authenticated confidential channel establishment and the security of TLS-DHE
- (Password) Authenticated Key Establishment: From 2-Party to Group
- Resource-aware protocols for authenticated group key exchange in integrated wired and wireless networks
- On the Importance of Public-Key Validation in the MQV and HMQV Key Agreement Protocols
- Designing Efficient Authenticated Key Exchange Resilient to Leakage of Ephemeral Secret Keys
- Progress in Cryptology – Mycrypt 2005
- Making the Diffie-Hellman Protocol Identity-Based
- Strongly Secure One Round Authenticated Key Exchange Protocol with Perfect Forward Security
- Progress in Cryptology – Mycrypt 2005
- Constant-Round Authenticated Group Key Exchange with Logarithmic Computation Complexity
- Authenticated key exchange and signatures with tight security in the standard model
- Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal
- Strongly-Secure Identity-Based Key Agreement and Anonymous Extension
- Degrees of Security: Protocol Guarantees in the Face of Compromising Adversaries
- An efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniable
- An eCK-Secure Authenticated Key Exchange Protocol without Random Oracles
- An improved identity-based key agreement protocol and its security proof
- Stronger Security of Authenticated Key Exchange
- A formal security analysis of the Signal messaging protocol
- Cryptographic Extraction and Key Derivation: The HKDF Scheme
- A New Security Model for Authenticated Key Agreement
- Strongly Secure Certificateless Key Agreement
- Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols
- The Cramer-Shoup Encryption Scheme Is Plaintext Aware in the Standard Model
- On security analysis of an after-the-fact leakage resilient key exchange protocol
- A Study of Two-Party Certificateless Authenticated Key-Agreement Protocols
- On the concrete security of TLS 1.3 PSK mode
- Authenticated Key Exchange and Key Encapsulation in the Standard Model
- A security weakness in Abdalla et al.'s generic construction of a group key exchange protocol
- Universally composable relaxed password authenticated key exchange
- KHAPE: Asymmetric PAKE from key-hiding key exchange
- CMQV+: an authenticated key exchange protocol from CMQV
- Errors in Computational Complexity Proofs for Protocols
- Cryptanalysis of a chaotic map-based password-authenticated key agreement protocol using smart cards
- Group key exchange protocols from supersingular isogenies
- Provably Secure Password Authenticated Key Exchange Based on RLWE for the Post-Quantum World
- 0-RTT Key Exchange with Full Forward Secrecy
- Another look at HMQV
- Extended KCI attack against two-party key establishment protocols
- Blake-Wilson, Johnson \& Menezes protocol revisited
- Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS
- Strongly secure authenticated key exchange from factoring, codes, and lattices
- FORSAKES: a forward-secure authenticated key exchange protocol based on symmetric key-evolving schemes
- Public Key Cryptography - PKC 2006
- Two-pass authenticated key exchange with explicit authentication and tight security
- One-round key exchange in the standard model
- Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode
- Decaf: Eliminating Cofactors Through Point Compression
- Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices
- Anonymity and one-way authentication in key exchange protocols
- A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols
- Certificateless one-pass and two-party authenticated key agreement protocol and its extensions
- Preserving privacy for free: efficient and provably secure two-factor authentication scheme with user anonymity
- A new framework for deniable secure key exchange
- Securing group key exchange against strong corruptions and key registration attacks
- Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
- Another Look at Tightness
- One-Pass HMQV and Asymmetric Key-Wrapping
- A New Key Exchange Protocol Based on MQV Assuming Public Computations
- More efficient post-quantum KEMTLS with pre-distributed public keys
- About the Security of MTI/C0 and MQV
- О криптографических свойствах алгоритмов, сопутствующих применению стандартов ГОСТ Р 34.11-2012 и ГОСТ Р 34.10-2012
- On reusing ephemeral keys in Diffie-Hellman key agreement protocols
- Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness
- Computer security
- On the Connection Between Signcryption and One-Pass Key Establishment
- Generic Compilers for Authenticated Key Exchange
- A Framework for Practical Universally Composable Zero-Knowledge Protocols
- One-Round Attribute-Based Key Exchange in the Multi-Party Setting
- TMQV: A Strongly eCK-Secure Diffie-Hellman Protocol without Gap Assumption
- Towards Denial-of-Service-Resilient Key Agreement Protocols
- Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman Protocols
- A Provably Secure One-Pass Two-Party Key Establishment Protocol
- Characterization of Strongly Secure Authenticated Key Exchanges without NAXOS Technique
- Fast Discretized Gaussian Sampling and Post-quantum TLS Ciphersuite
- Improved attacks against key reuse in learning with errors key exchange
- Efficient Public-Key Distance Bounding Protocol
- Security Analysis of the Modular Enhanced Symmetric Role Authentication (mERA) Protocol
- A strongly secure identity-based authenticated group key exchange protocol
- Asymmetric PAKE with low computation \textit{and} communication
- Title not available (Why is that?)
- A Modular Security Analysis of EAP and IEEE 802.11
- Strengthening the security of authenticated key exchange against bad randomness
- One-Round Attribute-Based Key Exchange in the Multi-party Setting
- The Whole is Less Than the Sum of Its Parts: Constructing More Efficient Lattice-Based AKEs
- Session-StateReveal is stronger than eCKs EphemeralKeyReveal: using automatic analysis to attack the NAXOS protocol
This page was built for software: HMQV