Authenticated key exchange protocol under computational Diffie-Hellman assumption from trapdoor test technique
暂无分享,去创建一个
[1] Jiang Wu,et al. Efficient Key Exchange with Tight Security Reduction , 2009, IACR Cryptol. ePrint Arch..
[2] C. P. Schnorr,et al. Efficient Identification and Signatures for Smart Cards (Abstract) , 1989, EUROCRYPT.
[3] Berkant Ustaoglu,et al. Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS , 2008, Des. Codes Cryptogr..
[4] Je Hong Park,et al. Authenticated Key Exchange Secure under the Computational Diffie-Hellman Assumption , 2008, IACR Cryptol. ePrint Arch..
[5] Qi Xie. A new authenticated key agreement for session initiation protocol , 2012, Int. J. Commun. Syst..
[6] Qinglei Zhou,et al. TUP: A New eCK-Secure AKE Protocol under the CDH Assumption , 2012 .
[7] Libin Wang,et al. TMQV: A Strongly eCK-Secure Diffie-Hellman Protocol without Gap Assumption , 2011, ProvSec.
[8] Zheng Yang,et al. Efficient eCK-secure Authenticated Key Exchange Protocols in the Standard Model , 2013, IACR Cryptol. ePrint Arch..
[9] Kristin E. Lauter,et al. Stronger Security of Authenticated Key Exchange , 2006, ProvSec.
[10] Berkant Ustaoglu,et al. Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman Protocols , 2009, ProvSec.
[11] Hugo Krawczyk,et al. HMQV: A High-Performance Secure Diffie-Hellman Protocol , 2005, CRYPTO.
[12] Tzonelih Hwang,et al. On 'a simple three-party password-based key exchange protocol' , 2011, Int. J. Commun. Syst..
[13] Tatsuaki Okamoto,et al. An eCK-secure Authenticated Key Exchange Protocol without Random Oracles , 2009, KSII Trans. Internet Inf. Syst..
[14] David Cash,et al. The Twin Diffie–Hellman Problem and Applications , 2009, Journal of Cryptology.
[15] Marcos A. Simplício,et al. Cryptanalysis of an efficient three-party password-based key exchange scheme , 2012, Int. J. Commun. Syst..
[16] Tatsuaki Okamoto,et al. Authenticated Key Exchange and Key Encapsulation in the Standard Model , 2007, ASIACRYPT.
[17] Jean-Claude Bajard,et al. A Secure and Efficient Authenticated Diffie-Hellman Protocol , 2009, EuroPKI.
[18] Atsushi Fujioka,et al. Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices , 2012, Public Key Cryptography.
[19] David Pointcheval,et al. The Gap-Problems: A New Class of Problems for the Security of Cryptographic Schemes , 2001, Public Key Cryptography.
[20] Zhenfu Cao,et al. Strongly Secure Authenticated Key Exchange Protocol Based on Computational Diffie-Hellman Problem , 2008, IACR Cryptol. ePrint Arch..
[21] Amos Fiat,et al. Zero-knowledge proofs of identity , 1987, Journal of Cryptology.
[22] Eun-Jun Yoon,et al. Cryptanalysis of a simple three-party password-based key exchange protocol , 2011, Int. J. Commun. Syst..
[23] Zheng Yang,et al. Strongly Authenticated Key Exchange Protocol from Bilinear Groups without Random Oracles , 2012, IACR Cryptol. ePrint Arch..
[24] Atsushi Fujioka,et al. Designing Efficient Authenticated Key Exchange Resilient to Leakage of Ephemeral Secret Keys , 2011, CT-RSA.
[25] Der-Chyuan Lou,et al. Efficient three-party password-based key exchange scheme , 2011, Int. J. Commun. Syst..
[26] Yunlei Zhao,et al. Taxonomical Security Consideration of Authenticated Key Exchange Resilient to Intermediate Computation Leakage , 2011, ProvSec.
[27] Atsushi Fujioka,et al. Strongly Secure Authenticated Key Exchange without NAXOS' Approach under Computational Diffie-Hellman Assumption , 2012, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[28] Mihir Bellare,et al. The Knowledge-of-Exponent Assumptions and 3-Round Zero-Knowledge Protocols , 2004, CRYPTO.
[29] Zhenfu Cao,et al. An ID-based authenticated key exchange protocol based on bilinear Diffie-Hellman problem , 2009, ASIACCS '09.