Leakage resilient authenticated key exchange secure in the auxiliary input model
Authenticated key exchange (AKE) protocols allow two parties communicating over an insecure network to establish a common secret key. They are among the most widely used cryptographic protocols in practice. In order to resist key-leakage attacks, several leakage resilient AKE protocols have been pro...
Saved in:
Main Authors: | YANG, Guomin, MU, Yi, SUSILO, Willy, WONG, Duncan S. |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2013
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/7379 https://ink.library.smu.edu.sg/context/sis_research/article/8382/viewcontent/Leakage_resilient_authenticated_key_exchange_secure_in_the_auxiliary_input_model.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
Strongly leakage resilient authenticated key exchange, revisited
by: YANG, Guomin, et al.
Published: (2019) -
Strong authenticated key exchange with auxiliary inputs
by: CHEN, Rongmao, et al.
Published: (2017) -
Strongly leakage-resilient authenticated key exchange
by: CHEN, Rongmao, et al.
Published: (2016) -
Authenticated key exchange under bad randomness
by: YANG, Guomin, et al.
Published: (2011) -
Authenticated key exchange under bad randomness
by: Yang, G., et al.
Published: (2014)