Strongly leakage-resilient authenticated key exchange
Authenticated Key Exchange (AKE) protocols have been widely deployed in many real-world applications for securing communication channels. In this paper, we make the following contributions. First, we revisit the security modelling of leakage-resilient AKE protocols, and show that the existing models...
Saved in:
Main Authors: | CHEN, Rongmao, MU, Yi, YANG, Guomin, SUSILO, Willy, GUO, Fuchun |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2016
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/7424 https://ink.library.smu.edu.sg/context/sis_research/article/8427/viewcontent/Strongly_leakage_resilient_authenticated_key_exchange.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
Strong authenticated key exchange with auxiliary inputs
by: CHEN, Rongmao, et al.
Published: (2017) -
Strongly leakage resilient authenticated key exchange, revisited
by: YANG, Guomin, et al.
Published: (2019) -
Leakage resilient authenticated key exchange secure in the auxiliary input model
by: YANG, Guomin, et al.
Published: (2013) -
Privacy-preserving biometric-based remote user authentication with leakage resilience
by: TIAN, Yangguang, et al.
Published: (2018) -
VOLERE: Leakage resilient user authentication based on personal voice challenges
by: ZHANG, Rui, et al.
Published: (2023)