A Comprehensive Formal Security Analysis and Revision of the Two-phase Key Exchange Primitive of TPM 2.0
暂无分享,去创建一个
Yong Guan | Qianying Zhang | Shijun Zhao | Zhiping Shi | Guohui Wang | Zhiping Shi | Yong Guan | Guohui Wang | Shijun Zhao | Qianying Zhang
[1] Hugo Krawczyk,et al. Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels , 2001, EUROCRYPT.
[2] Eric Rescorla,et al. The Transport Layer Security (TLS) Protocol Version 1.3 , 2018, RFC.
[3] Alfred Menezes,et al. An Efficient Protocol for Authenticated Key Agreement , 2003, Des. Codes Cryptogr..
[4] Hugo Krawczyk,et al. Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead , 2010, ACNS.
[5] Alfred Menezes,et al. Unknown Key-Share Attacks on the Station-to-Station (STS) Protocol , 1999, Public Key Cryptography.
[6] Kenneth G. Paterson,et al. Efficient One-Round Key Exchange in the Standard Model , 2008, ACISP.
[7] Zhiping Shi,et al. A New Way to Prevent UKS Attacks Using Hardware Security Chips , 2017, Int. J. Netw. Secur..
[8] Ittai Anati,et al. Innovative Technology for CPU Based Attestation and Sealing , 2013 .
[9] Angelos D. Keromytis,et al. Just fast keying: Key agreement in a hostile internet , 2004, TSEC.
[10] Dong Hoon Lee,et al. One-Round Protocols for Two-Party Authenticated Key Exchange , 2004, ACNS.
[11] Alfred Menezes,et al. Security arguments for the UM key agreement protocol in the NIST SP 800-56A standard , 2008, ASIACCS '08.
[12] Tatsuaki Okamoto,et al. Authenticated Key Exchange and Key Encapsulation in the Standard Model , 2007, ASIACRYPT.
[13] Lidong Chen,et al. Recommendation for Key Derivation Using Pseudorandom Functions (Revised) , 2009 .
[14] William M. Daley,et al. Digital Signature Standard (DSS) , 2000 .
[15] Dengguo Feng,et al. Security analysis of SM2 key exchange protocol in TPM2.0 , 2015, Secur. Commun. Networks.
[16] Hugo Krawczyk,et al. HMQV: A High-Performance Secure Diffie-Hellman Protocol , 2005, CRYPTO.
[17] Kristin E. Lauter,et al. Security Analysis of KEA Authenticated Key Exchange Protocol , 2006, IACR Cryptol. ePrint Arch..
[18] Elaine B. Barker,et al. SP 800-56A. Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography (Revised) , 2007 .
[19] Ernest F. Brickell,et al. Direct anonymous attestation , 2004, CCS '04.
[20] Kristin E. Lauter,et al. Stronger Security of Authenticated Key Exchange , 2006, ProvSec.
[21] Berkant Ustaoglu,et al. Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman Protocols , 2009, ProvSec.
[22] Tim Dierks,et al. The Transport Layer Security (TLS) Protocol Version 1.2 , 2008 .
[23] Burton S. Kaliski,et al. An unknown key-share attack on the MQV key agreement protocol , 2001, ACM Trans. Inf. Syst. Secur..
[24] Bogdan Warinschi,et al. Security of the TCG Privacy-CA Solution , 2010, 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.
[25] Hugo Krawczyk,et al. Security Analysis of IKE's Signature-Based Key-Exchange Protocol , 2002, CRYPTO.
[26] Cas J. F. Cremers. Session-state Reveal Is Stronger Than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange Protocol , 2009, ACNS.
[27] Dengguo Feng,et al. Comments on the SM2 Key Exchange Protocol , 2011, CANS.
[28] Berkant Ustaoglu,et al. Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS , 2008, Des. Codes Cryptogr..
[29] Qianying Zhang,et al. A Unified Security Analysis of Two-Phase Key Exchange Protocols in TPM 2.0 , 2015, TRUST.
[30] Carlos V. Rozas,et al. Innovative instructions and software model for isolated execution , 2013, HASP '13.
[31] Hideki Imai,et al. ON SEEKING SMART PUBLIC-KEY-DISTRIBUTION SYSTEMS. , 1986 .
[32] Yunlei Zhao,et al. OAKE: a new family of implicitly authenticated diffie-hellman protocols , 2013, CCS.
[33] Qianying Zhang,et al. sHMQV: An Efficient Key Exchange Protocol for Power-Limited Devices , 2015, ISPEC.
[34] Dengguo Feng,et al. Improving the Security of the HMQV Protocol Using Tamper-Proof Hardware , 2014, SecureComm.
[35] Y. Shtarkov,et al. The context-tree weighting method: basic properties , 1995, IEEE Trans. Inf. Theory.
[36] Mihir Bellare,et al. Entity Authentication and Key Distribution , 1993, CRYPTO.
[37] Jacques Stern,et al. Security Proofs for Signature Schemes , 1996, EUROCRYPT.