![]() ![]() ![]() Cryptology ePrint Archive, Report 2014/123 (2014). 2(2), 107–125 (1992)ĭousti, M.S., Jalili, R.: FORSAKES: a forward-secure authenticated key exchange protocol based on symmetric key-evolving schemes. Theory 22(6), 644–654 (1976)ĭiffie, W., van Oorschot, P.C., Wiener, M.J.: Authentication and authenticated key exchanges. ĭiffie, W., Hellman, M.E.: New directions in cryptography. In: 2017 IEEE European Symposium on Security and Privacy (EuroS&P), pp. Ĭohn-Gordon, K., Cremers, C., Dowling, B., Garratt, L., Stebila, D.: A formal security analysis of the signal messaging protocol. īrzuska, C., Jacobsen, H., Stebila, D.: Safely exporting keys from secure channels. īrier, E., Peyrin, T.: A forward-secure symmetric-key derivation protocol. ![]() īoyd, C., Mathuria, A.: Protocols for Authentication and Key Establishment. īlake-Wilson, S., Johnson, D., Menezes, A.: Key agreement protocols and their security analysis. īellare, M., Yee, B.: Forward-security in private-key cryptography. īellare, M., Rogaway, P.: The security of triple encryption and a framework for code-based game-playing proofs. īellare, M., Rogaway, P.: Entity authentication and key distribution. īellare, M., Namprempre, C.: Authenticated encryption: relations among notions and analysis of the generic composition paradigm. īellare, M., Miner, S.K.: A forward-secure digital signature scheme. IEEE Computer Society Press, October 1997. īellare, M., Desai, A., Jokipii, E., Rogaway, P.: A concrete security treatment of symmetric encryption. Cryptology ePrint Archive, Report 2019/444 (2019). Īmerican National Standards Institute: ANSI X9.24-1:2009 Retail Financial Services Symmetric Key Management Part 1: Using Symmetric Techniques (2009)Īvoine, G., Canard, S., Ferreira, L.: Symmetric-key Authenticated Key Exchange (SAKE) with Perfect Forward Secrecy. Īlwen, J., Coretti, S., Dodis, Y.: The Double Ratchet: Security Notions, Proofs, and Modularization for the Signal Protocol. Īdrian, D., et al.: Imperfect forward secrecy: how Diffie-Hellman fails in practice. Ībdalla, M., Bellare, M.: Increasing the lifetime of a key: a comparative analysis of the security of re-keying techniques. ģrd Generation Partnership Project: Technical Specifications 35. 3rd Generation Partnership Project: Technical Specifications 33. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |