Key Exchanges
Author:
Zhang JiangORCID, Zhang Zhenfeng
Publisher
Springer Singapore
Reference108 articles.
1. Abdalla, M., Benhamouda, F., MacKenzie, P.: Security of the J-PAKE password-authenticated key exchange protocol. In: IEEE S&P 2015, pp. 571–587 (2015).
https://doi.org/10.1109/SP.2015.41 2. Abdalla, M., Benhamouda, F., Pointcheval, D.: Disjunctions for hash proof systems: new constructions and applications. In: Oswald, E., Fischlin, M. (eds.) EUROCRYPT 2015, LNCS, vol. 9057, pp. 69–100. Springer, Heidelberg (2015) 3. Abdalla, M., Chevalier, C., Pointcheval, D.: Smooth projective hashing for conditionally extractable commitments. In: Halevi, S. (ed.) CRYPTO 2009, LNCS, vol. 5677, pp. 671–689. Springer, Heidelberg (2009).
https://doi.org/10.1007/978-3-642-03356-8_39 4. Abe, M., Cui, Y., Imai, H., Kiltz, E.: Efficient hybrid encryption from ID-based encryption. Des. Codes Crypt. 54(3), 205–240 (2010) 5. Albrecht, M.R., Player, R., Scott, S.: On the concrete hardness of learning with errors. J. Math. Cryptol. 9, 169–203 (2015)
|
|