Authenticated Key Exchange and Key Encapsulation in the Standard Model (original) (raw)

Strong authenticated key exchange with auxiliary inputs

Willy Susilo

Designs, Codes and Cryptography, 2016

View PDFchevron_right

Forward-Secure Authenticated Symmetric Key Exchange Protocol: New Security Model and Secure Construction

Suvradip Chakraborty

View PDFchevron_right

Leakage Resilient Authenticated Key Exchange Secure in the Auxiliary Input Model

Willy Susilo

Lecture Notes in Computer Science, 2013

View PDFchevron_right

Security Enhancement and Modular Treatment towards Authenticated Key Exchange

Changshe Ma

Lecture Notes in Computer Science, 2010

View PDFchevron_right

Leakage resilient eCK-secure key exchange protocol without random oracles

Tatsuaki Okamoto

Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

View PDFchevron_right

Efficient Public-Key Cryptography in the Presence of Key Leakage

pok lim

2010

View PDFchevron_right

Strongly Leakage-Resilient Authenticated Key Exchange

Willy Susilo

Lecture Notes in Computer Science, 2016

View PDFchevron_right

Certificateless KEM and Hybrid Signcryption Schemes Revisited

sree vivek

Lecture Notes in Computer Science, 2010

View PDFchevron_right

A provably secure one-pass two-party key establishment protocol

Konstantinos Chalkias

Information Security and …, 2008

View PDFchevron_right

A New Security Definition for Public Key Encryption Schemes and Its Applications

Xiaotie Deng

View PDFchevron_right

Pretty-simple password-authenticated key-exchange protocol proven to be secure in the standard model

Hideki Imai

IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences

View PDFchevron_right

Authenticated Key Exchange Secure Against Dictionary Attacks

Satheesh Sharma

View PDFchevron_right

Provably secure password-authenticated key exchange using Diffie-Hellman

sindulakshmi l.narayanan

Advances in Cryptology—Eurocrypt …, 2000

View PDFchevron_right

Provably secure and efficient certificateless authenticated tripartite key agreement protocol

Hui Xiong

Mathematical and Computer Modelling - MATH COMPUT MODELLING

View PDFchevron_right

Simulatable certificateless two-party authenticated key agreement protocol

qianhong wu

Information Sciences, 2010

View PDFchevron_right

Easy Verifiable Primitives and Practical Public Key Cryptosystems

David Galindo

Lecture Notes in Computer Science, 2003

View PDFchevron_right

Information-theoretic Key Encapsulation and its Applications

Setareh Sharifian

arXiv (Cornell University), 2021

View PDFchevron_right

Public-key encryption with non-interactive opening: New constructions and stronger definitions

Dominique Schröder

Progress in Cryptology …, 2010

View PDFchevron_right

Universally Composable Password-Based Key Exchange

Ran Canetti

Lecture Notes in Computer Science, 2005

View PDFchevron_right

A note on the strong authenticated key exchange with auxiliary inputs

Willy Susilo

Designs, Codes and Cryptography, 2017

View PDFchevron_right

A New Security Model for Authenticated Key Agreement

Philippe Elbaz-vincent

Security and Cryptography for Networks, 2010

View PDFchevron_right

A Secure and Efficient Key Agreement Protocol Based on Certificateless Cryptography

mohammed hassouna

International Journal of Intelligent Computing Research, 2012

View PDFchevron_right

Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange

Nina Bindel

Post-Quantum Cryptography, 2019

View PDFchevron_right

Efficient authenticated encryption schemes with public verifiability

Changshe Ma

IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004, 2004

View PDFchevron_right

An Efficient and Leakage-Resilient RSA-Based Authenticated Key Exchange Protocol with Tight Security Reduction

Hideki Imai

IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2007

View PDFchevron_right

An efficient certificateless two-party authenticated key agreement protocol

Dr Sahadeo Padhye

Computers & Mathematics with Applications, 2012

View PDFchevron_right

A Universally Composable Secure Channel Based on the KEM-DEM Framework*A preliminary version of this paper was presented at Theory of Cryptography Conference (TCC), LNCS, vol.3378, pp.426--444, February 2005

Yoshifumi Manabe

Ieice Transactions on Fundamentals of Electronics Communications and Computer Sciences, 2006

View PDFchevron_right

Efficient and provably secure key agreement

V. Chrissikopoulos

IFIP Advances in Information and Communication Technology, 1996

View PDFchevron_right

Direct chosen-ciphertext secure identity-based key encapsulation without random oracles

David Galindo

Theoretical Computer Science, 2009

View PDFchevron_right

eCK Secure Single Round ID-Based Authenticated Key Exchange Protocols with Master Perfect Forward Secrecy

Somanath Tripathy

Lecture Notes in Computer Science, 2014

View PDFchevron_right

Universally Composable Client-to-Client General Authenticated Key Exchange

Shinsaku Kiyomoto

Ipsj Digital Courier, 2007

View PDFchevron_right

An efficient certificateless authenticated key agreement scheme

Dr Sahadeo Padhye

IACR Cryptology ePrint Archive, 2011

View PDFchevron_right

ASICS: Authenticated Key Exchange Security Incorporating Certification Systems

Michele Feltz

Lecture Notes in Computer Science, 2013

View PDFchevron_right

IPAKE: Isomorphisms for Password-Based Authenticated Key Exchange

D. Catalano

View PDFchevron_right

A new family of authentication protocols

Harry Manifavas, Bruno Crispo

ACM SIGOPS …, 1998

View PDFchevron_right