Authenticated Diffe-Hellman key agreement protocols

S Blake-Wilson, A Menezes - International Workshop on Selected Areas in …, 1998 - Springer
This paper surveys recent work on the design and analysis of key agreement protocols that
are based on the intractability of the Diffe-Hellman problem. The focus is on protocols that …

A formal security analysis of the signal messaging protocol

K Cohn-Gordon, C Cremers, B Dowling, L Garratt… - Journal of …, 2020 - Springer
The Signal protocol is a cryptographic messaging protocol that provides end-to-end
encryption for instant messaging in WhatsApp, Wire, and Facebook Messenger among …

The elliptic curve digital signature algorithm (ECDSA)

D Johnson, A Menezes, S Vanstone - International journal of information …, 2001 - Springer
Abstract The Elliptic Curve Digital Signature Algorithm (ECDSA) is the elliptic curve
analogue of the Digital Signature Algorithm (DSA). It was accepted in 1999 as an ANSI …

[图书][B] Protocols for authentication and key establishment

C Boyd, A Mathuria, D Stebila - 2003 - Springer
The first edition of this book was published in 2003. Inevitably, certain parts of the book
became outdated quickly. At the same time new developments have continued apace …

SIGMA: The 'SIGn-and-MAc'approach to authenticated Diffie-Hellman and its use in the IKE protocols

H Krawczyk - Annual international cryptology conference, 2003 - Springer
We present the SIGMA family of key-exchange protocols and the “SIGn-and-MAc” approach
to authenticated Diffie-Hellman underlying its design. The SIGMA protocols provide perfect …

Automated analysis of Diffie-Hellman protocols and advanced security properties

B Schmidt, S Meier, C Cremers… - 2012 IEEE 25th …, 2012 - ieeexplore.ieee.org
We present a general approach for the symbolic analysis of security protocols that use Diffie-
Hellman exponentiation to achieve advanced security properties. We model protocols as …

Triple handshakes and cookie cutters: Breaking and fixing authentication over TLS

K Bhargavan, AD Lavaud, C Fournet… - … IEEE Symposium on …, 2014 - ieeexplore.ieee.org
TLS was designed as a transparent channel abstraction to allow developers with no
cryptographic expertise to protect their application against attackers that may control some …

The lattice-based digital signature scheme qTESLA

E Alkim, PSLM Barreto, N Bindel, J Krämer… - … Conference on Applied …, 2020 - Springer
We present qTESLA, a post-quantum provably-secure digital signature scheme that exhibits
several attractive features such as simplicity, strong security guarantees against quantum …

Blockchain security and privacy

G Karame, S Capkun - IEEE Security & Privacy, 2018 - computer.org
The blockchain emerged as a novel distributed consensus scheme that allows transactions,
and any other data, to be securely stored and verified without the need of any centralized …

Security analysis of a chaotic map-based authentication scheme for telecare medicine information systems

WC Yau, RCW Phan - Journal of medical systems, 2013 - Springer
Many authentication schemes have been proposed for telecare medicine information
systems (TMIS) to ensure the privacy, integrity, and availability of patient records. These …