Authenticated Diffe-Hellman key agreement protocols
S Blake-Wilson, A Menezes - International Workshop on Selected Areas in …, 1998 - Springer
This paper surveys recent work on the design and analysis of key agreement protocols that
are based on the intractability of the Diffe-Hellman problem. The focus is on protocols that …
are based on the intractability of the Diffe-Hellman problem. The focus is on protocols that …
A formal security analysis of the signal messaging protocol
The Signal protocol is a cryptographic messaging protocol that provides end-to-end
encryption for instant messaging in WhatsApp, Wire, and Facebook Messenger among …
encryption for instant messaging in WhatsApp, Wire, and Facebook Messenger among …
The elliptic curve digital signature algorithm (ECDSA)
D Johnson, A Menezes, S Vanstone - International journal of information …, 2001 - Springer
Abstract The Elliptic Curve Digital Signature Algorithm (ECDSA) is the elliptic curve
analogue of the Digital Signature Algorithm (DSA). It was accepted in 1999 as an ANSI …
analogue of the Digital Signature Algorithm (DSA). It was accepted in 1999 as an ANSI …
[图书][B] Protocols for authentication and key establishment
The first edition of this book was published in 2003. Inevitably, certain parts of the book
became outdated quickly. At the same time new developments have continued apace …
became outdated quickly. At the same time new developments have continued apace …
SIGMA: The 'SIGn-and-MAc'approach to authenticated Diffie-Hellman and its use in the IKE protocols
H Krawczyk - Annual international cryptology conference, 2003 - Springer
We present the SIGMA family of key-exchange protocols and the “SIGn-and-MAc” approach
to authenticated Diffie-Hellman underlying its design. The SIGMA protocols provide perfect …
to authenticated Diffie-Hellman underlying its design. The SIGMA protocols provide perfect …
Automated analysis of Diffie-Hellman protocols and advanced security properties
We present a general approach for the symbolic analysis of security protocols that use Diffie-
Hellman exponentiation to achieve advanced security properties. We model protocols as …
Hellman exponentiation to achieve advanced security properties. We model protocols as …
Triple handshakes and cookie cutters: Breaking and fixing authentication over TLS
TLS was designed as a transparent channel abstraction to allow developers with no
cryptographic expertise to protect their application against attackers that may control some …
cryptographic expertise to protect their application against attackers that may control some …
The lattice-based digital signature scheme qTESLA
We present qTESLA, a post-quantum provably-secure digital signature scheme that exhibits
several attractive features such as simplicity, strong security guarantees against quantum …
several attractive features such as simplicity, strong security guarantees against quantum …
Blockchain security and privacy
The blockchain emerged as a novel distributed consensus scheme that allows transactions,
and any other data, to be securely stored and verified without the need of any centralized …
and any other data, to be securely stored and verified without the need of any centralized …
Security analysis of a chaotic map-based authentication scheme for telecare medicine information systems
Many authentication schemes have been proposed for telecare medicine information
systems (TMIS) to ensure the privacy, integrity, and availability of patient records. These …
systems (TMIS) to ensure the privacy, integrity, and availability of patient records. These …