Back to Results
First PageMeta Content
Public-key cryptography / Communications protocol / Advantage / Peer-to-peer / Side channel attack / Cryptography / Cryptographic protocols / Random oracle


A Unified Security Model of Authenticated Key Exchange with Specific Adversarial Capabilities Weiqiang Wena,b,1 , Libin Wanga,b,2 , Jiaxin Panc,3 a b
Add to Reading List

Document Date: 2015-04-18 19:15:30


Open Document

File Size: 214,81 KB

Share Result on Facebook

City

Beijing / /

Company

China State Key Laboratory / /

/

Event

FDA Phase / /

Facility

Institute of Information Engineering / Mathematics Horst G¨ ortz Institute / China State Key Laboratory of Information Security / South China Normal University / /

/

IndustryTerm

tamper-resistant device / insecure network / secure protocol / protocol / multi-pass protocols / type protocol / important tool / encryption algorithm / temper resistant device / /

Organization

School of Computer / Chinese Academy of Sciences / South China Normal University / Guangzhou / Institute of Information Engineering / Faculty of Mathematics Horst G¨ ortz Institute for IT-Security Ruhr University Bochum / /

/

Position

weiqwen@gmail.com Corresponding author / designer / protocol designer / /

Product

CK / /

Region

South China / /

Technology

OAKE protocol / 5 protocols / proposed protocols / public key / improved OAKE protocol / provably secure AKE protocol / strongly secure AKE protocol / VOAKE protocol / encryption algorithm / NAXOS protocol / proposed VOAKE protocol / AKE protocols / underlying algorithms / private key / secret key / SMQV protocol / simulation / implicitly authenticated Diffie-Hellman key exchange protocols / HMQV protocol / Authenticated Key Exchange protocols / multi-pass protocols / provably secure Diffie-Hellman type protocol / AKE protocol / /

SocialTag