NAXOS
From MaRDI portal
Software:15583
No author found.
Related Items
Standard model leakage-resilient authenticated key exchange using inner-product extractors ⋮ Another Look at Tightness ⋮ An efficient authenticated key exchange from random self-reducibility on CSIDH ⋮ Towards post-quantum security for signal's X3DH handshake ⋮ Practical isogeny-based key-exchange with optimal tightness ⋮ A strongly secure identity-based authenticated group key exchange protocol ⋮ An efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniable ⋮ Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices ⋮ Improved attacks against key reuse in learning with errors key exchange ⋮ More efficient post-quantum KEMTLS with pre-distributed public keys ⋮ Continuous After-the-Fact Leakage-Resilient eCK-Secure Key Exchange ⋮ On the Security of TLS-DHE in the Standard Model ⋮ Blake-Wilson, Johnson \& Menezes protocol revisited ⋮ An efficient certificateless two-party authenticated key agreement protocol ⋮ Strong authenticated key exchange with auxiliary inputs ⋮ Strengthening the security of authenticated key exchange against bad randomness ⋮ On the leakage-resilient key exchange ⋮ On security analysis of an after-the-fact leakage resilient key exchange protocol ⋮ Authenticated Key Exchange and Key Encapsulation in the Standard Model ⋮ A novel pairing-free certificateless authenticated key agreement protocol with provable security ⋮ A secure and efficient on-line/off-line group key distribution protocol ⋮ Efficient Public-Key Distance Bounding Protocol ⋮ One-Round Attribute-Based Key Exchange in the Multi-party Setting ⋮ Strongly Secure Two-Party Certificateless Key Agreement Protocol with Short Message ⋮ Stronger Security of Authenticated Key Exchange ⋮ FORSAKES: a forward-secure authenticated key exchange protocol based on symmetric key-evolving schemes ⋮ Anonymity and one-way authentication in key exchange protocols ⋮ Authenticated confidential channel establishment and the security of TLS-DHE ⋮ Provably secure three-party password-based authenticated key exchange protocol ⋮ Session-StateReveal is stronger than eCKs EphemeralKeyReveal: using automatic analysis to attack the NAXOS protocol ⋮ Two-pass authenticated key exchange with explicit authentication and tight security ⋮ One-Round Attribute-Based Key Exchange in the Multi-Party Setting ⋮ CMQV+: an authenticated key exchange protocol from CMQV ⋮ A formal security analysis of the Signal messaging protocol ⋮ An efficient eCK secure identity based two party authenticated key agreement scheme with security against active adversaries ⋮ Security weaknesses of a signature scheme and authenticated key agreement protocols ⋮ Secure Cross-Realm Client-to-Client Password-Based Authenticated Key Exchange Against Undetectable On-Line Dictionary Attacks ⋮ Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal ⋮ Strongly secure authenticated key exchange from factoring, codes, and lattices ⋮ A cryptographic analysis of the TLS 1.3 handshake protocol ⋮ Flexible Group Key Exchange with On-demand Computation of Subgroup Keys ⋮ A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols ⋮ A Generic Variant of NIST’s KAS2 Key Agreement Protocol ⋮ A simple provably secure AKE from the LWE problem ⋮ One-Round Authenticated Key Exchange with Strong Forward Secrecy in the Standard Model against Constrained Adversary ⋮ A Modular Security Analysis of EAP and IEEE 802.11 ⋮ Degrees of Security: Protocol Guarantees in the Face of Compromising Adversaries ⋮ A New Security Model for Authenticated Key Agreement ⋮ Analysis and improvement of an authenticated multiple key exchange protocol ⋮ Strongly secure identity-based authenticated key agreement protocols ⋮ New approach to practical leakage-resilient public-key cryptography ⋮ Towards isogeny-based password-authenticated key establishment ⋮ Generic Compilers for Authenticated Key Exchange ⋮ Combined Security Analysis of the One- and Three-Pass Unified Model Key Agreement Protocols ⋮ Strongly Secure Two-Pass Attribute-Based Authenticated Key Exchange ⋮ Ephemeral Key Leakage Resilient and Efficient ID-AKEs That Can Share Identities, Private and Master Keys ⋮ Strongly secure identity-based authenticated key agreement protocols without bilinear pairings ⋮ On the Connection Between Signcryption and One-Pass Key Establishment ⋮ Securing group key exchange against strong corruptions and key registration attacks ⋮ Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols ⋮ Security Analysis of the Modular Enhanced Symmetric Role Authentication (mERA) Protocol ⋮ Designing Efficient Authenticated Key Exchange Resilient to Leakage of Ephemeral Secret Keys ⋮ Stronger Difficulty Notions for Client Puzzles and Denial-of-Service-Resistant Protocols ⋮ Batch Computations Revisited: Combining Key Computations and Batch Verifications ⋮ Certificateless two-party authenticated key agreement scheme for smart grid ⋮ Towards Denial-of-Service-Resilient Key Agreement Protocols ⋮ Taxonomical Security Consideration of Authenticated Key Exchange Resilient to Intermediate Computation Leakage ⋮ TMQV: A Strongly eCK-Secure Diffie-Hellman Protocol without Gap Assumption ⋮ Strongly Secure One Round Authenticated Key Exchange Protocol with Perfect Forward Security ⋮ Strongly Secure Certificateless Key Agreement ⋮ Characterization of Strongly Secure Authenticated Key Exchanges without NAXOS Technique ⋮ A New Spin on Quantum Cryptography: Avoiding Trapdoors and Embracing Public Keys ⋮ On Forward Secrecy in One-Round Key Exchange ⋮ An eCK-Secure Authenticated Key Exchange Protocol without Random Oracles ⋮ Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman Protocols ⋮ Reusing Static Keys in Key Agreement Protocols ⋮ A Study of Two-Party Certificateless Authenticated Key-Agreement Protocols ⋮ Signed (group) Diffie-Hellman key exchange with tight security ⋮ Efficient and Strongly Secure Password-Based Server Aided Key Exchange (Extended Abstract) ⋮ Leaky Random Oracle (Extended Abstract) ⋮ Strongly leakage resilient authenticated key exchange, revisited ⋮ Quantifying the security cost of migrating protocols to practice ⋮ Revocable hierarchical identity-based authenticated key exchange ⋮ 0-RTT Key Exchange with Full Forward Secrecy ⋮ Adaptive-ID secure hierarchical ID-based authenticated key exchange under standard assumptions without random oracles ⋮ Tighter proofs for the SIGMA and TLS 1.3 key exchange protocols
This page was built for software: NAXOS