HMQV
From MaRDI portal
Software:15253
swMATH2714MaRDI QIDQ15253FDOQ15253
Author name not available (Why is that?)
Cited In (95)
- О криптографических свойствах алгоритмов, сопутствующих применению стандартов ГОСТ Р 34.11-2012 и ГОСТ Р 34.10-2012
- Parallel key exchange
- On reusing ephemeral keys in Diffie-Hellman key agreement protocols
- Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness
- Computer security
- On the Connection Between Signcryption and One-Pass Key Establishment
- Generic Compilers for Authenticated Key Exchange
- One-Round Attribute-Based Key Exchange in the Multi-Party Setting
- TMQV: A Strongly eCK-Secure Diffie-Hellman Protocol without Gap Assumption
- Towards Denial-of-Service-Resilient Key Agreement Protocols
- A Provably Secure One-Pass Two-Party Key Establishment Protocol
- Fast Discretized Gaussian Sampling and Post-quantum TLS Ciphersuite
- Improved attacks against key reuse in learning with errors key exchange
- Efficient Public-Key Distance Bounding Protocol
- Security Analysis of the Modular Enhanced Symmetric Role Authentication (mERA) Protocol
- A strongly secure identity-based authenticated group key exchange protocol
- Asymmetric PAKE with low computation \textit{and} communication
- A Modular Security Analysis of EAP and IEEE 802.11
- Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman protocols
- Strengthening the security of authenticated key exchange against bad randomness
- A framework for practical universally composable zero-knowledge protocols
- One-Round Attribute-Based Key Exchange in the Multi-party Setting
- The Whole is Less Than the Sum of Its Parts: Constructing More Efficient Lattice-Based AKEs
- Characterization of strongly secure authenticated key exchanges without NAXOS technique
- Session-StateReveal is stronger than eCKs EphemeralKeyReveal: using automatic analysis to attack the NAXOS protocol
- Cryptographic extraction and key derivation: the HKDF scheme
- An efficient authenticated key exchange from random self-reducibility on CSIDH
- Practical isogeny-based key-exchange with optimal tightness
- Towards post-quantum security for signal's X3DH handshake
- A simple provably secure AKE from the LWE problem
- Certificateless public key encryption: a new generic construction and two pairing-free schemes
- A key manipulation attack on some recent isogeny-based key agreement protocols
- Authenticated confidential channel establishment and the security of TLS-DHE
- (Password) Authenticated Key Establishment: From 2-Party to Group
- Resource-aware protocols for authenticated group key exchange in integrated wired and wireless networks
- On the Importance of Public-Key Validation in the MQV and HMQV Key Agreement Protocols
- Progress in Cryptology – Mycrypt 2005
- Making the Diffie-Hellman Protocol Identity-Based
- Progress in Cryptology – Mycrypt 2005
- Constant-Round Authenticated Group Key Exchange with Logarithmic Computation Complexity
- Authenticated key exchange and signatures with tight security in the standard model
- Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal
- Strongly-Secure Identity-Based Key Agreement and Anonymous Extension
- An efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniable
- An improved identity-based key agreement protocol and its security proof
- Stronger Security of Authenticated Key Exchange
- A formal security analysis of the Signal messaging protocol
- A New Security Model for Authenticated Key Agreement
- Strongly Secure Certificateless Key Agreement
- Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols
- The Cramer-Shoup Encryption Scheme Is Plaintext Aware in the Standard Model
- On security analysis of an after-the-fact leakage resilient key exchange protocol
- A Study of Two-Party Certificateless Authenticated Key-Agreement Protocols
- On the concrete security of TLS 1.3 PSK mode
- Authenticated Key Exchange and Key Encapsulation in the Standard Model
- A security weakness in Abdalla et al.'s generic construction of a group key exchange protocol
- Universally composable relaxed password authenticated key exchange
- KHAPE: Asymmetric PAKE from key-hiding key exchange
- CMQV+: an authenticated key exchange protocol from CMQV
- Errors in Computational Complexity Proofs for Protocols
- Cryptanalysis of a chaotic map-based password-authenticated key agreement protocol using smart cards
- Efficient constructions of signcryption schemes and signcryption composability
- Group key exchange protocols from supersingular isogenies
- Provably Secure Password Authenticated Key Exchange Based on RLWE for the Post-Quantum World
- 0-RTT Key Exchange with Full Forward Secrecy
- One-pass HMQV and asymmetric key-wrapping
- Another look at HMQV
- Extended KCI attack against two-party key establishment protocols
- Another look at tightness
- Blake-Wilson, Johnson \& Menezes protocol revisited
- Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS
- Strongly secure authenticated key exchange from factoring, codes, and lattices
- Taxonomical security consideration of authenticated key exchange resilient to intermediate computation leakage
- FORSAKES: a forward-secure authenticated key exchange protocol based on symmetric key-evolving schemes
- Public Key Cryptography - PKC 2006
- Two-pass authenticated key exchange with explicit authentication and tight security
- One-round key exchange in the standard model
- Highly-efficient universally-composable commitments based on the DDH assumption
- Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode
- Decaf: Eliminating Cofactors Through Point Compression
- Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices
- Anonymity and one-way authentication in key exchange protocols
- A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols
- Certificateless one-pass and two-party authenticated key agreement protocol and its extensions
- Preserving privacy for free: efficient and provably secure two-factor authentication scheme with user anonymity
- A new framework for deniable secure key exchange
- Securing group key exchange against strong corruptions and key registration attacks
- An eCK-secure authenticated key exchange protocol without random oracles
- Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
- Degrees of security: protocol guarantees in the face of compromising adversaries
- Designing efficient authenticated key exchange resilient to leakage of ephemeral secret keys
- Strongly secure one round authenticated key exchange protocol with perfect forward security
- A New Key Exchange Protocol Based on MQV Assuming Public Computations
- More efficient post-quantum KEMTLS with pre-distributed public keys
- About the Security of MTI/C0 and MQV
This page was built for software: HMQV