HMQV
From MaRDI portal
Software:15253
swMATH2714MaRDI QIDQ15253FDOQ15253
Author name not available (Why is that?)
Cited In (95)
- Cryptographic extraction and key derivation: the HKDF scheme
- An efficient authenticated key exchange from random self-reducibility on CSIDH
- Practical isogeny-based key-exchange with optimal tightness
- Towards post-quantum security for signal's X3DH handshake
- A simple provably secure AKE from the LWE problem
- Certificateless public key encryption: a new generic construction and two pairing-free schemes
- A key manipulation attack on some recent isogeny-based key agreement protocols
- Authenticated confidential channel establishment and the security of TLS-DHE
- (Password) Authenticated Key Establishment: From 2-Party to Group
- Resource-aware protocols for authenticated group key exchange in integrated wired and wireless networks
- On the Importance of Public-Key Validation in the MQV and HMQV Key Agreement Protocols
- Progress in Cryptology – Mycrypt 2005
- Making the Diffie-Hellman Protocol Identity-Based
- Progress in Cryptology – Mycrypt 2005
- Constant-Round Authenticated Group Key Exchange with Logarithmic Computation Complexity
- Authenticated key exchange and signatures with tight security in the standard model
- Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal
- Strongly-Secure Identity-Based Key Agreement and Anonymous Extension
- An efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniable
- Provably secure password authenticated key exchange based on RLWE for the post-quantum world
- An improved identity-based key agreement protocol and its security proof
- Stronger Security of Authenticated Key Exchange
- A formal security analysis of the Signal messaging protocol
- A New Security Model for Authenticated Key Agreement
- Strongly Secure Certificateless Key Agreement
- Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols
- The Cramer-Shoup Encryption Scheme Is Plaintext Aware in the Standard Model
- Decaf: eliminating cofactors through point compression
- On security analysis of an after-the-fact leakage resilient key exchange protocol
- A Study of Two-Party Certificateless Authenticated Key-Agreement Protocols
- On the concrete security of TLS 1.3 PSK mode
- Authenticated Key Exchange and Key Encapsulation in the Standard Model
- A security weakness in Abdalla et al.'s generic construction of a group key exchange protocol
- Universally composable relaxed password authenticated key exchange
- KHAPE: Asymmetric PAKE from key-hiding key exchange
- CMQV+: an authenticated key exchange protocol from CMQV
- Errors in Computational Complexity Proofs for Protocols
- Cryptanalysis of a chaotic map-based password-authenticated key agreement protocol using smart cards
- Efficient constructions of signcryption schemes and signcryption composability
- Group key exchange protocols from supersingular isogenies
- One-pass HMQV and asymmetric key-wrapping
- Another look at HMQV
- Extended KCI attack against two-party key establishment protocols
- Another look at tightness
- Blake-Wilson, Johnson \& Menezes protocol revisited
- Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS
- Strongly secure authenticated key exchange from factoring, codes, and lattices
- Taxonomical security consideration of authenticated key exchange resilient to intermediate computation leakage
- FORSAKES: a forward-secure authenticated key exchange protocol based on symmetric key-evolving schemes
- Public Key Cryptography - PKC 2006
- Two-pass authenticated key exchange with explicit authentication and tight security
- One-round key exchange in the standard model
- Highly-efficient universally-composable commitments based on the DDH assumption
- Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode
- Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices
- Anonymity and one-way authentication in key exchange protocols
- A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols
- Certificateless one-pass and two-party authenticated key agreement protocol and its extensions
- Preserving privacy for free: efficient and provably secure two-factor authentication scheme with user anonymity
- A new framework for deniable secure key exchange
- Securing group key exchange against strong corruptions and key registration attacks
- An eCK-secure authenticated key exchange protocol without random oracles
- Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
- Degrees of security: protocol guarantees in the face of compromising adversaries
- Designing efficient authenticated key exchange resilient to leakage of ephemeral secret keys
- Strongly secure one round authenticated key exchange protocol with perfect forward security
- A New Key Exchange Protocol Based on MQV Assuming Public Computations
- More efficient post-quantum KEMTLS with pre-distributed public keys
- About the Security of MTI/C0 and MQV
- 0-RTT key exchange with full forward secrecy
- A modular security analysis of EAP and IEEE 802.11
- Parallel key exchange
- On reusing ephemeral keys in Diffie-Hellman key agreement protocols
- Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness
- Computer security
- On the Connection Between Signcryption and One-Pass Key Establishment
- Generic Compilers for Authenticated Key Exchange
- One-Round Attribute-Based Key Exchange in the Multi-Party Setting
- TMQV: A Strongly eCK-Secure Diffie-Hellman Protocol without Gap Assumption
- Efficient public-key distance bounding protocol
- Towards Denial-of-Service-Resilient Key Agreement Protocols
- Security analysis of the modular enhanced symmetric role authentication (mERA) protocol
- A Provably Secure One-Pass Two-Party Key Establishment Protocol
- Fast Discretized Gaussian Sampling and Post-quantum TLS Ciphersuite
- On the cryptographic properties of algorithms accompanying the applications of standards GOST R 34.11-2012 and GOST R 34.10-2012
- Improved attacks against key reuse in learning with errors key exchange
- A strongly secure identity-based authenticated group key exchange protocol
- Asymmetric PAKE with low computation \textit{and} communication
- One-round attribute-based key exchange in the multi-party setting
- The whole is less than the sum of its parts: constructing more efficient lattice-based AKEs
- Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman protocols
- Strengthening the security of authenticated key exchange against bad randomness
- A framework for practical universally composable zero-knowledge protocols
- Characterization of strongly secure authenticated key exchanges without NAXOS technique
- Session-StateReveal is stronger than eCKs EphemeralKeyReveal: using automatic analysis to attack the NAXOS protocol
This page was built for software: HMQV