NAXOS
From MaRDI portal
Software:15583
swMATH3050MaRDI QIDQ15583FDOQ15583
Author name not available (Why is that?)
Cited In (86)
- Combined Security Analysis of the One- and Three-Pass Unified Model Key Agreement Protocols
- On the Connection Between Signcryption and One-Pass Key Establishment
- Generic Compilers for Authenticated Key Exchange
- One-Round Attribute-Based Key Exchange in the Multi-Party Setting
- Batch Computations Revisited: Combining Key Computations and Batch Verifications
- TMQV: A Strongly eCK-Secure Diffie-Hellman Protocol without Gap Assumption
- Towards Denial-of-Service-Resilient Key Agreement Protocols
- Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman Protocols
- Characterization of Strongly Secure Authenticated Key Exchanges without NAXOS Technique
- A Generic Variant of NIST’s KAS2 Key Agreement Protocol
- Efficient Public-Key Distance Bounding Protocol
- Strongly Secure Two-Party Certificateless Key Agreement Protocol with Short Message
- Security Analysis of the Modular Enhanced Symmetric Role Authentication (mERA) Protocol
- Strongly Secure Two-Pass Attribute-Based Authenticated Key Exchange
- Secure Cross-Realm Client-to-Client Password-Based Authenticated Key Exchange Against Undetectable On-Line Dictionary Attacks
- A strongly secure identity-based authenticated group key exchange protocol
- Flexible Group Key Exchange with On-demand Computation of Subgroup Keys
- A Modular Security Analysis of EAP and IEEE 802.11
- Strengthening the security of authenticated key exchange against bad randomness
- A secure and efficient on-line/off-line group key distribution protocol
- One-Round Attribute-Based Key Exchange in the Multi-party Setting
- Session-StateReveal is stronger than eCKs EphemeralKeyReveal: using automatic analysis to attack the NAXOS protocol
- A novel pairing-free certificateless authenticated key agreement protocol with provable security
- Taxonomical Security Consideration of Authenticated Key Exchange Resilient to Intermediate Computation Leakage
- Revocable hierarchical identity-based authenticated key exchange
- An efficient eCK secure identity based two party authenticated key agreement scheme with security against active adversaries
- Adaptive-ID secure hierarchical ID-based authenticated key exchange under standard assumptions without random oracles
- An efficient authenticated key exchange from random self-reducibility on CSIDH
- Practical isogeny-based key-exchange with optimal tightness
- Towards post-quantum security for signal's X3DH handshake
- A simple provably secure AKE from the LWE problem
- Security weaknesses of a signature scheme and authenticated key agreement protocols
- Authenticated confidential channel establishment and the security of TLS-DHE
- Analysis and improvement of an authenticated multiple key exchange protocol
- Strongly secure identity-based authenticated key agreement protocols
- Provably secure three-party password-based authenticated key exchange protocol
- Strong authenticated key exchange with auxiliary inputs
- Designing Efficient Authenticated Key Exchange Resilient to Leakage of Ephemeral Secret Keys
- Efficient and Strongly Secure Password-Based Server Aided Key Exchange (Extended Abstract)
- On Forward Secrecy in One-Round Key Exchange
- A cryptographic analysis of the TLS 1.3 handshake protocol
- Strongly Secure One Round Authenticated Key Exchange Protocol with Perfect Forward Security
- Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal
- Continuous After-the-Fact Leakage-Resilient eCK-Secure Key Exchange
- Ephemeral Key Leakage Resilient and Efficient ID-AKEs That Can Share Identities, Private and Master Keys
- Degrees of Security: Protocol Guarantees in the Face of Compromising Adversaries
- An efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniable
- New approach to practical leakage-resilient public-key cryptography
- An eCK-Secure Authenticated Key Exchange Protocol without Random Oracles
- Stronger Security of Authenticated Key Exchange
- A formal security analysis of the Signal messaging protocol
- Towards isogeny-based password-authenticated key establishment
- A New Security Model for Authenticated Key Agreement
- Strongly Secure Certificateless Key Agreement
- Leaky Random Oracle (Extended Abstract)
- Improved attacks against key reuse in learning with errors key exchange
- Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols
- On the Security of TLS-DHE in the Standard Model
- On security analysis of an after-the-fact leakage resilient key exchange protocol
- A Study of Two-Party Certificateless Authenticated Key-Agreement Protocols
- Authenticated Key Exchange and Key Encapsulation in the Standard Model
- Strongly secure identity-based authenticated key agreement protocols without bilinear pairings
- CMQV+: an authenticated key exchange protocol from CMQV
- One-Round Authenticated Key Exchange with Strong Forward Secrecy in the Standard Model against Constrained Adversary
- Certificateless two-party authenticated key agreement scheme for smart grid
- 0-RTT Key Exchange with Full Forward Secrecy
- Blake-Wilson, Johnson \& Menezes protocol revisited
- A New Spin on Quantum Cryptography: Avoiding Trapdoors and Embracing Public Keys
- On the leakage-resilient key exchange
- Strongly secure authenticated key exchange from factoring, codes, and lattices
- FORSAKES: a forward-secure authenticated key exchange protocol based on symmetric key-evolving schemes
- An efficient certificateless two-party authenticated key agreement protocol
- Signed (group) Diffie-Hellman key exchange with tight security
- Two-pass authenticated key exchange with explicit authentication and tight security
- Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices
- Anonymity and one-way authentication in key exchange protocols
- Reusing Static Keys in Key Agreement Protocols
- Tighter proofs for the SIGMA and TLS 1.3 key exchange protocols
- Strongly leakage resilient authenticated key exchange, revisited
- A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols
- Securing group key exchange against strong corruptions and key registration attacks
- Another Look at Tightness
- Stronger Difficulty Notions for Client Puzzles and Denial-of-Service-Resistant Protocols
- Quantifying the security cost of migrating protocols to practice
- Standard model leakage-resilient authenticated key exchange using inner-product extractors
- More efficient post-quantum KEMTLS with pre-distributed public keys
This page was built for software: NAXOS