Leakage resilient eCK-secure key exchange protocol without random oracles
暂无分享,去创建一个
[1] Moni Naor,et al. Public-Key Cryptosystems Resilient to Key Leakage , 2009, SIAM J. Comput..
[2] Guy N. Rothblum,et al. Leakage-Resilient Signatures , 2010, TCC.
[3] Kristin E. Lauter,et al. Stronger Security of Authenticated Key Exchange , 2006, ProvSec.
[4] Berkant Ustaoglu,et al. Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman Protocols , 2009, ProvSec.
[5] Vinod Vaikuntanathan,et al. Simultaneous Hardcore Bits and Cryptography against Memory Attacks , 2009, TCC.
[6] Jiang Wu,et al. Efficient Key Exchange with Tight Security Reduction , 2009, IACR Cryptol. ePrint Arch..
[7] Yevgeniy Dodis,et al. Efficient Public-Key Cryptography in the Presence of Key Leakage , 2010, ASIACRYPT.
[8] Silvio Micali,et al. Physically Observable Cryptography (Extended Abstract) , 2004, TCC.
[9] Hugo Krawczyk,et al. Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels , 2001, EUROCRYPT.
[10] Yvo Desmedt,et al. A New Paradigm of Hybrid Encryption Scheme , 2004, CRYPTO.
[11] Yuefei Zhu,et al. A Framework for Authenticated Key Exchange in the Standard Model , 2009, ISPEC.
[12] Ronald Cramer,et al. Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack , 2003, SIAM J. Comput..
[13] Yevgeniy Dodis,et al. Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model , 2009, CRYPTO.
[14] Tatsuaki Okamoto,et al. An eCK-secure Authenticated Key Exchange Protocol without Random Oracles , 2009, KSII Trans. Internet Inf. Syst..
[15] Atsushi Fujioka,et al. Strongly Secure Authenticated Key Exchange without NAXOS' Approach , 2009, IWSEC.
[16] Ronald Cramer,et al. Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption , 2001, EUROCRYPT.
[17] Moni Naor,et al. Public-Key Encryption in the Bounded-Retrieval Model , 2010, EUROCRYPT.
[18] Moni Naor,et al. Public-Key Cryptosystems Resilient to Key Leakage , 2012, SIAM J. Comput..
[19] Jean-Claude Bajard,et al. A Secure and Efficient Authenticated Diffie-Hellman Protocol , 2009, EuroPKI.
[20] Rafail Ostrovsky,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..
[21] Vinod Vaikuntanathan,et al. Signature Schemes with Bounded Leakage Resilience , 2009, ASIACRYPT.
[22] Yael Tauman Kalai,et al. On cryptography with auxiliary input , 2009, STOC '09.
[23] Tatsuaki Okamoto. Authenticated Key Exchange and Key Encapsulation Without Random Oracles , 2007, IACR Cryptol. ePrint Arch..
[24] Berkant Ustaoglu,et al. Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS , 2008, Des. Codes Cryptogr..