Authenticated Key Exchange and Key Encapsulation in the Standard Model (original) (raw)
Related papers
Strong authenticated key exchange with auxiliary inputs
Designs, Codes and Cryptography, 2016
Leakage Resilient Authenticated Key Exchange Secure in the Auxiliary Input Model
Lecture Notes in Computer Science, 2013
Security Enhancement and Modular Treatment towards Authenticated Key Exchange
Lecture Notes in Computer Science, 2010
Leakage resilient eCK-secure key exchange protocol without random oracles
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
Efficient Public-Key Cryptography in the Presence of Key Leakage
2010
Strongly Leakage-Resilient Authenticated Key Exchange
Lecture Notes in Computer Science, 2016
Certificateless KEM and Hybrid Signcryption Schemes Revisited
Lecture Notes in Computer Science, 2010
A provably secure one-pass two-party key establishment protocol
Information Security and …, 2008
A New Security Definition for Public Key Encryption Schemes and Its Applications
Pretty-simple password-authenticated key-exchange protocol proven to be secure in the standard model
IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences
Authenticated Key Exchange Secure Against Dictionary Attacks
Provably secure password-authenticated key exchange using Diffie-Hellman
Advances in CryptologyEurocrypt …, 2000
Provably secure and efficient certificateless authenticated tripartite key agreement protocol
Mathematical and Computer Modelling - MATH COMPUT MODELLING
Simulatable certificateless two-party authenticated key agreement protocol
Information Sciences, 2010
Easy Verifiable Primitives and Practical Public Key Cryptosystems
Lecture Notes in Computer Science, 2003
Information-theoretic Key Encapsulation and its Applications
arXiv (Cornell University), 2021
Public-key encryption with non-interactive opening: New constructions and stronger definitions
Progress in Cryptology …, 2010
Universally Composable Password-Based Key Exchange
Lecture Notes in Computer Science, 2005
A note on the strong authenticated key exchange with auxiliary inputs
Designs, Codes and Cryptography, 2017
A New Security Model for Authenticated Key Agreement
Security and Cryptography for Networks, 2010
A Secure and Efficient Key Agreement Protocol Based on Certificateless Cryptography
International Journal of Intelligent Computing Research, 2012
Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange
Post-Quantum Cryptography, 2019
Efficient authenticated encryption schemes with public verifiability
IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004, 2004
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2007
An efficient certificateless two-party authenticated key agreement protocol
Computers & Mathematics with Applications, 2012
Ieice Transactions on Fundamentals of Electronics Communications and Computer Sciences, 2006
Efficient and provably secure key agreement
IFIP Advances in Information and Communication Technology, 1996
Direct chosen-ciphertext secure identity-based key encapsulation without random oracles
Theoretical Computer Science, 2009
Lecture Notes in Computer Science, 2014
Universally Composable Client-to-Client General Authenticated Key Exchange
Ipsj Digital Courier, 2007
An efficient certificateless authenticated key agreement scheme
IACR Cryptology ePrint Archive, 2011
ASICS: Authenticated Key Exchange Security Incorporating Certification Systems
Lecture Notes in Computer Science, 2013
IPAKE: Isomorphisms for Password-Based Authenticated Key Exchange
A new family of authentication protocols
ACM SIGOPS …, 1998