NAXOS

From MaRDI portal
Software:15583



swMATH3050MaRDI QIDQ15583


No author found.





Related Items

Standard model leakage-resilient authenticated key exchange using inner-product extractorsAnother Look at TightnessAn efficient authenticated key exchange from random self-reducibility on CSIDHTowards post-quantum security for signal's X3DH handshakePractical isogeny-based key-exchange with optimal tightnessA strongly secure identity-based authenticated group key exchange protocolAn efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniableStrongly Secure Authenticated Key Exchange from Factoring, Codes, and LatticesImproved attacks against key reuse in learning with errors key exchangeMore efficient post-quantum KEMTLS with pre-distributed public keysContinuous After-the-Fact Leakage-Resilient eCK-Secure Key ExchangeOn the Security of TLS-DHE in the Standard ModelBlake-Wilson, Johnson \& Menezes protocol revisitedAn efficient certificateless two-party authenticated key agreement protocolStrong authenticated key exchange with auxiliary inputsStrengthening the security of authenticated key exchange against bad randomnessOn the leakage-resilient key exchangeOn security analysis of an after-the-fact leakage resilient key exchange protocolAuthenticated Key Exchange and Key Encapsulation in the Standard ModelA novel pairing-free certificateless authenticated key agreement protocol with provable securityA secure and efficient on-line/off-line group key distribution protocolEfficient Public-Key Distance Bounding ProtocolOne-Round Attribute-Based Key Exchange in the Multi-party SettingStrongly Secure Two-Party Certificateless Key Agreement Protocol with Short MessageStronger Security of Authenticated Key ExchangeFORSAKES: a forward-secure authenticated key exchange protocol based on symmetric key-evolving schemesAnonymity and one-way authentication in key exchange protocolsAuthenticated confidential channel establishment and the security of TLS-DHEProvably secure three-party password-based authenticated key exchange protocolSession-StateReveal is stronger than eCKs EphemeralKeyReveal: using automatic analysis to attack the NAXOS protocolTwo-pass authenticated key exchange with explicit authentication and tight securityOne-Round Attribute-Based Key Exchange in the Multi-Party SettingCMQV+: an authenticated key exchange protocol from CMQVA formal security analysis of the Signal messaging protocolAn efficient eCK secure identity based two party authenticated key agreement scheme with security against active adversariesSecurity weaknesses of a signature scheme and authenticated key agreement protocolsSecure Cross-Realm Client-to-Client Password-Based Authenticated Key Exchange Against Undetectable On-Line Dictionary AttacksBeyond eCK: perfect forward secrecy under actor compromise and ephemeral-key revealStrongly secure authenticated key exchange from factoring, codes, and latticesA cryptographic analysis of the TLS 1.3 handshake protocolFlexible Group Key Exchange with On-demand Computation of Subgroup KeysA mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocolsA Generic Variant of NIST’s KAS2 Key Agreement ProtocolA simple provably secure AKE from the LWE problemOne-Round Authenticated Key Exchange with Strong Forward Secrecy in the Standard Model against Constrained AdversaryA Modular Security Analysis of EAP and IEEE 802.11Degrees of Security: Protocol Guarantees in the Face of Compromising AdversariesA New Security Model for Authenticated Key AgreementAnalysis and improvement of an authenticated multiple key exchange protocolStrongly secure identity-based authenticated key agreement protocolsNew approach to practical leakage-resilient public-key cryptographyTowards isogeny-based password-authenticated key establishmentGeneric Compilers for Authenticated Key ExchangeCombined Security Analysis of the One- and Three-Pass Unified Model Key Agreement ProtocolsStrongly Secure Two-Pass Attribute-Based Authenticated Key ExchangeEphemeral Key Leakage Resilient and Efficient ID-AKEs That Can Share Identities, Private and Master KeysStrongly secure identity-based authenticated key agreement protocols without bilinear pairingsOn the Connection Between Signcryption and One-Pass Key EstablishmentSecuring group key exchange against strong corruptions and key registration attacksModeling Key Compromise Impersonation Attacks on Group Key Exchange ProtocolsSecurity Analysis of the Modular Enhanced Symmetric Role Authentication (mERA) ProtocolDesigning Efficient Authenticated Key Exchange Resilient to Leakage of Ephemeral Secret KeysStronger Difficulty Notions for Client Puzzles and Denial-of-Service-Resistant ProtocolsBatch Computations Revisited: Combining Key Computations and Batch VerificationsCertificateless two-party authenticated key agreement scheme for smart gridTowards Denial-of-Service-Resilient Key Agreement ProtocolsTaxonomical Security Consideration of Authenticated Key Exchange Resilient to Intermediate Computation LeakageTMQV: A Strongly eCK-Secure Diffie-Hellman Protocol without Gap AssumptionStrongly Secure One Round Authenticated Key Exchange Protocol with Perfect Forward SecurityStrongly Secure Certificateless Key AgreementCharacterization of Strongly Secure Authenticated Key Exchanges without NAXOS TechniqueA New Spin on Quantum Cryptography: Avoiding Trapdoors and Embracing Public KeysOn Forward Secrecy in One-Round Key ExchangeAn eCK-Secure Authenticated Key Exchange Protocol without Random OraclesComparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman ProtocolsReusing Static Keys in Key Agreement ProtocolsA Study of Two-Party Certificateless Authenticated Key-Agreement ProtocolsSigned (group) Diffie-Hellman key exchange with tight securityEfficient and Strongly Secure Password-Based Server Aided Key Exchange (Extended Abstract)Leaky Random Oracle (Extended Abstract)Strongly leakage resilient authenticated key exchange, revisitedQuantifying the security cost of migrating protocols to practiceRevocable hierarchical identity-based authenticated key exchange0-RTT Key Exchange with Full Forward SecrecyAdaptive-ID secure hierarchical ID-based authenticated key exchange under standard assumptions without random oraclesTighter proofs for the SIGMA and TLS 1.3 key exchange protocols


This page was built for software: NAXOS