ASICS: Authenticated Key Exchange Security Incorporating Certification Systems
暂无分享,去创建一个
Kenneth G. Paterson | Colin Boyd | Douglas Stebila | Cas J. F. Cremers | Bertram Poettering | Michèle Feltz
[1] Alfred Menezes,et al. Another look at HMQV , 2007, J. Math. Cryptol..
[2] Mihir Bellare,et al. Entity Authentication and Key Distribution , 1993, CRYPTO.
[3] Kristin E. Lauter,et al. Security Analysis of KEA Authenticated Key Exchange Protocol , 2006, IACR Cryptol. ePrint Arch..
[4] Kristin E. Lauter,et al. Stronger Security of Authenticated Key Exchange , 2006, ProvSec.
[5] Berkant Ustaoglu,et al. Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman Protocols , 2009, ProvSec.
[6] Alfred Menezes,et al. Entity Authentication and Authenticated Key Transport Protocols Employing Asymmetric Techniques , 1997, Security Protocols Workshop.
[7] David Cash,et al. The Twin Diffie-Hellman Problem and Applications , 2008, EUROCRYPT.
[8] Hugo Krawczyk,et al. Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels , 2001, EUROCRYPT.
[9] Mihir Bellare,et al. Provably secure session key distribution: the three party case , 1995, STOC '95.
[10] Chae Hoon Lim,et al. A Key Recovery Attack on Discrete Log-based Schemes Using a Prime Order Subgroupp , 1997, CRYPTO.
[11] Ian Goldberg,et al. Anonymity and one-way authentication in key exchange protocols , 2012, Designs, Codes and Cryptography.
[12] Alfred Menezes,et al. Unknown Key-Share Attacks on the Station-to-Station (STS) Protocol , 1999, Public Key Cryptography.
[13] Alfred Menezes,et al. Security arguments for the UM key agreement protocol in the NIST SP 800-56A standard , 2008, ASIACCS '08.
[14] Alfred Menezes,et al. Key Agreement Protocols and Their Security Analysis , 1997, IMACC.
[15] Cas J. F. Cremers. Examining indistinguishability-based security models for key exchange protocols: the case of CK, CK-HMQV, and eCK , 2011, ASIACCS '11.
[16] Thomas Ristenpart,et al. The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks , 2007, EUROCRYPT.
[17] Dong Hoon Lee,et al. One-Round Protocols for Two-Party Authenticated Key Exchange , 2004, ACNS.
[18] Burton S. Kaliski,et al. An unknown key-share attack on the MQV key agreement protocol , 2001, ACM Trans. Inf. Syst. Secur..
[19] Sanjit Chatterjee,et al. Combined Security Analysis of the One- and Three-Pass Unified Model Key Agreement Protocols , 2010, INDOCRYPT.
[20] Jim Schaad,et al. Internet X.509 Public Key Infrastructure Certificate Request Message Format (CRMF) , 2005, RFC.
[21] Alfred Menezes,et al. On the Importance of Public-Key Validation in the MQV and HMQV Key Agreement Protocols , 2006, INDOCRYPT.
[22] Elaine B. Barker. Recommendation for Key Management - Part 1 General , 2014 .
[23] Kenneth G. Paterson,et al. Modular Security Proofs for Key Agreement Protocols , 2005, ASIACRYPT.
[24] Berkant Ustaoglu,et al. Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS , 2008, Des. Codes Cryptogr..
[25] Kenneth G. Paterson,et al. Non-Interactive Key Exchange , 2012, IACR Cryptol. ePrint Arch..
[26] Hugo Krawczyk,et al. HMQV: A High-Performance Secure Diffie-Hellman Protocol , 2005, CRYPTO.
[27] Cas J. F. Cremers,et al. Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal , 2015, Des. Codes Cryptogr..
[28] Mihir Bellare,et al. Authenticated Key Exchange Secure against Dictionary Attacks , 2000, EUROCRYPT.