Verifying MQV-Based Protocols Using ProVerif

[1]  Bruno. Blanchet,et al.  Modeling and Verifying Security Protocols with the Applied Pi Calculus and ProVerif , 2016, Found. Trends Priv. Secur..

[2]  Rosario Gennaro,et al.  Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement , 2010, Pairing.

[3]  Colin Boyd,et al.  A Tutorial Introduction to Authentication and Key Establishment , 2003 .

[4]  Colin Boyd,et al.  Protocols for Authentication and Key Establishment , 2003, Information Security and Cryptography.

[5]  Mohamed M. Fouad,et al.  Efficient pairing-free, certificateless two-party authenticated key agreement protocol for grid computing , 2014, 2014 Fourth International Conference on Digital Information and Communication Technology and its Applications (DICTAP).

[6]  Xianming Gao,et al.  A Systematic Approach to Formal Analysis of QUIC Handshake Protocol Using Symbolic Model Checking , 2021, Secur. Commun. Networks.

[7]  Kim-Kwang Raymond Choo Key establishment : proofs and refutations , 2006 .

[8]  Colin Boyd,et al.  Examining Indistinguishability-Based Proof Models for Key Establishment Protocols , 2005, ASIACRYPT.

[9]  Qiang Wang,et al.  Formal Analysis of QUIC Handshake Protocol Using Symbolic Model Checking , 2021, IEEE Access.

[10]  Burton S. Kaliski,et al.  An unknown key-share attack on the MQV key agreement protocol , 2001, ACM Trans. Inf. Syst. Secur..

[11]  Jeng-Shyang Pan,et al.  Improved ECC-Based Three-Factor Multiserver Authentication Scheme , 2021, Secur. Commun. Networks.

[12]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[13]  Yehuda Lindell,et al.  Introduction to Modern Cryptography, Second Edition , 2014 .

[14]  Yehuda Lindell,et al.  Introduction to Modern Cryptography , 2004 .

[15]  Ben Smyth,et al.  ProVerif 1.85: Automatic Cryptographic Protocol Verifier, User Manual and Tutorial , 2011 .

[16]  Ashok Kumar Das,et al.  On the Design of Lightweight and Secure Mutual Authentication System for Global Roaming in Resource-Limited Mobility Networks , 2021, IEEE Access.

[17]  Rosario Gennaro,et al.  Making the Diffie-Hellman Protocol Identity-Based , 2010, CT-RSA.

[18]  Sahadeo Padhye,et al.  An efficient certificateless two-party authenticated key agreement protocol , 2012, Comput. Math. Appl..

[19]  Danny Dolev,et al.  On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).