Security of a leakage-resilient protocol for key establishment and mutual authentication (original) (raw)

Leakage-Resilient Authenticated Key Establishment Protocols

Hideki Imai

Lecture Notes in Computer Science, 2003

View PDFchevron_right

A Simple Leakage-Resilient Authenticated Key Establishment Protocol, Its Extensions, and Applications

Hideki Imai

IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2005

View PDFchevron_right

Weaknesses in a leakage-resilient authenticated key transport protocol

Chris Mitchell

2005

View PDFchevron_right

A note on leakage-resilient authenticated key exchange

Jung-Ah Hwang

IEEE Transactions on Wireless Communications, 2000

View PDFchevron_right

Strongly Leakage-Resilient Authenticated Key Exchange

Willy Susilo

Lecture Notes in Computer Science, 2016

View PDFchevron_right

Leakage Resilient Authenticated Key Exchange Secure in the Auxiliary Input Model

Willy Susilo

Lecture Notes in Computer Science, 2013

View PDFchevron_right

Strongly leakage resilient authenticated key exchange, revisited

Willy Susilo

Designs, Codes and Cryptography, 2019

View PDFchevron_right

Leakage resilient eCK-secure key exchange protocol without random oracles

Tatsuaki Okamoto

Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

View PDFchevron_right

A Leakage-resilient ID-based Authenticated Key Exchange Protocol with a Revocation Mechanism

Yuh-Min Tseng

IEEE Access

View PDFchevron_right

Efficient Leakage-Resilient Authenticated Key Agreement Protocol in the Continual Leakage eCK Model

Yuh-Min Tseng

IEEE Access

View PDFchevron_right

New approach to practical leakage-resilient public-key cryptography

Janaka Alawatugoda

Journal of Mathematical Cryptology

View PDFchevron_right

An Efficient and Leakage-Resilient RSA-Based Authenticated Key Exchange Protocol with Tight Security Reduction

Hideki Imai

IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2007

View PDFchevron_right

Strong authenticated key exchange with auxiliary inputs

Willy Susilo

Designs, Codes and Cryptography, 2016

View PDFchevron_right

On the Security of Some Password-Based Key Agreement Schemes

Chris Mitchell

Lecture Notes in Computer Science, 2005

View PDFchevron_right

A Method for Making Password-Based Key Exchange Resilient to Server Compromise

Zulfikar Ramzan

2006

View PDFchevron_right

Standard model leakage-resilient authenticated key exchange using inner-product extractors

Tatsuaki Okamoto

Designs, Codes and Cryptography, 2022

View PDFchevron_right

On the security of a password-only authenticated three-party key exchange protocol

Juryon Paik

View PDFchevron_right

Pretty-simple password-authenticated key-exchange protocol proven to be secure in the standard model

Hideki Imai

IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences

View PDFchevron_right

An efficient client–client password-based authentication scheme with provable security

mohammad sabzinejad Farash

View PDFchevron_right

IPAKE: Isomorphisms for Password-Based Authenticated Key Exchange

D. Catalano

View PDFchevron_right

Enhanced password-based key establishment protocol

Chris Mitchell

2005

View PDFchevron_right

Provably secure password-authenticated key exchange using Diffie-Hellman

sindulakshmi l.narayanan

Advances in Cryptology—Eurocrypt …, 2000

View PDFchevron_right

Security Proof of "Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA

Hideki Imai

View PDFchevron_right

Authenticated Key Exchange Secure Against Dictionary Attacks

Satheesh Sharma

View PDFchevron_right

Leakage Resilient Cryptography in Practice

Jean-jacques Quisquater

Information Security and Cryptography, 2010

View PDFchevron_right

A weakness in Sun-Chen-Hwang's three-party key agreement protocols using passwords

Seungjoo Kim

View PDFchevron_right

A Leakage-Resilient Certificateless Authenticated Key Exchange Protocol Withstanding Side-Channel Attacks

Yuh-Min Tseng

IEEE Access

View PDFchevron_right

Mitigating Server Breaches in Password-Based Authentication: Secure and Efficient Solutions

Olivier Blazy

Topics in Cryptology - CT-RSA 2016, 2016

View PDFchevron_right

A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol

Hideki Imai

Lecture Notes in Computer Science, 2007

View PDFchevron_right

Cryptanalysis of a client-to-client password-authenticated key agreement protocol

Fengjiao Wang

View PDFchevron_right

Efficient provably secure password-based explicit authenticated key agreement

Neeraj Kumar

Pervasive and Mobile Computing, 2015

View PDFchevron_right

Security weakness in a three-party pairing-based protocol for password authenticated key exchange

Thiru Neels

Information Sciences, 2007

View PDFchevron_right

Strengthening the security of key exchange protocols

Michele Feltz

2014

View PDFchevron_right

Universally Composable Password-Based Key Exchange

Ran Canetti

Lecture Notes in Computer Science, 2005

View PDFchevron_right