Authenticated Key Exchange and Key Encapsulation Without Random Oracles
暂无分享,去创建一个
[1] Marc Fischlin,et al. Completely Non-malleable Schemes , 2005, ICALP.
[2] Hideki Imai,et al. ON SEEKING SMART PUBLIC-KEY-DISTRIBUTION SYSTEMS. , 1986 .
[3] Hugo Krawczyk,et al. HMQV: A High-Performance Secure Diffie-Hellman Protocol , 2005, CRYPTO.
[4] Kristin E. Lauter,et al. Stronger Security of Authenticated Key Exchange , 2006, ProvSec.
[5] Silvio Micali,et al. How to construct random functions , 1986, JACM.
[6] Kaoru Kurosawa,et al. Tag-KEM/DEM: A New Framework for Hybrid Encryption , 2008, Journal of Cryptology.
[7] Kaoru Kurosawa,et al. Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM , 2005, EUROCRYPT.
[8] Tatsuaki Okamoto,et al. Authenticated Key Exchange and Key Encapsulation in the Standard Model , 2007, ASIACRYPT.
[9] Ronald Cramer,et al. Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack , 2003, SIAM J. Comput..
[10] Moni Naor,et al. Universal one-way hash functions and their cryptographic applications , 1989, STOC '89.
[11] Alfred Menezes,et al. Another look at HMQV , 2007, J. Math. Cryptol..
[12] Hugo Krawczyk,et al. Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels , 2001, EUROCRYPT.
[13] Yvo Desmedt,et al. A New Paradigm of Hybrid Encryption Scheme , 2004, CRYPTO.
[14] John Rompel,et al. One-way functions are necessary and sufficient for secure signatures , 1990, STOC '90.
[15] Leonid A. Levin,et al. A Pseudorandom Generator from any One-way Function , 1999, SIAM J. Comput..
[16] Alfred Menezes,et al. An Efficient Protocol for Authenticated Key Agreement , 2003, Des. Codes Cryptogr..
[17] Berkant Ustaoglu,et al. Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS , 2008, Des. Codes Cryptogr..