Security of a leakage-resilient protocol for key establishment and mutual authentication (original) (raw)
Related papers
Leakage-Resilient Authenticated Key Establishment Protocols
Lecture Notes in Computer Science, 2003
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2005
Weaknesses in a leakage-resilient authenticated key transport protocol
2005
A note on leakage-resilient authenticated key exchange
IEEE Transactions on Wireless Communications, 2000
Strongly Leakage-Resilient Authenticated Key Exchange
Lecture Notes in Computer Science, 2016
Leakage Resilient Authenticated Key Exchange Secure in the Auxiliary Input Model
Lecture Notes in Computer Science, 2013
Strongly leakage resilient authenticated key exchange, revisited
Designs, Codes and Cryptography, 2019
Leakage resilient eCK-secure key exchange protocol without random oracles
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
A Leakage-resilient ID-based Authenticated Key Exchange Protocol with a Revocation Mechanism
IEEE Access
Efficient Leakage-Resilient Authenticated Key Agreement Protocol in the Continual Leakage eCK Model
IEEE Access
New approach to practical leakage-resilient public-key cryptography
Journal of Mathematical Cryptology
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2007
Strong authenticated key exchange with auxiliary inputs
Designs, Codes and Cryptography, 2016
On the Security of Some Password-Based Key Agreement Schemes
Lecture Notes in Computer Science, 2005
A Method for Making Password-Based Key Exchange Resilient to Server Compromise
2006
Standard model leakage-resilient authenticated key exchange using inner-product extractors
Designs, Codes and Cryptography, 2022
On the security of a password-only authenticated three-party key exchange protocol
Pretty-simple password-authenticated key-exchange protocol proven to be secure in the standard model
IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences
An efficient client–client password-based authentication scheme with provable security
IPAKE: Isomorphisms for Password-Based Authenticated Key Exchange
Enhanced password-based key establishment protocol
2005
Provably secure password-authenticated key exchange using Diffie-Hellman
Advances in CryptologyEurocrypt …, 2000
Security Proof of "Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA
Authenticated Key Exchange Secure Against Dictionary Attacks
Leakage Resilient Cryptography in Practice
Information Security and Cryptography, 2010
A weakness in Sun-Chen-Hwang's three-party key agreement protocols using passwords
IEEE Access
Mitigating Server Breaches in Password-Based Authentication: Secure and Efficient Solutions
Topics in Cryptology - CT-RSA 2016, 2016
A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol
Lecture Notes in Computer Science, 2007
Cryptanalysis of a client-to-client password-authenticated key agreement protocol
Efficient provably secure password-based explicit authenticated key agreement
Pervasive and Mobile Computing, 2015
Security weakness in a three-party pairing-based protocol for password authenticated key exchange
Information Sciences, 2007
Strengthening the security of key exchange protocols
2014
Universally Composable Password-Based Key Exchange
Lecture Notes in Computer Science, 2005