搜索结果: 1-3 共查到“密码学 NAXOS”相关记录3条 . 查询时间(0.062 秒)
Tightly-Secure Authenticated Key Exchange without NAXOS' approach based on Decision Linear Problem
AKE eCK model NAXOS' approach
2016/4/21
Design secure Authenticated Key Exchange (AKE) protocol without NAXOS approach is remaining as an open problem. NAXOS approach \cite{4} is used to hide the secret ephemeral key from an adversary even ...
Session-state Reveal is stronger than Ephemeral Key Reveal:Breaking the NAXOS key exchange protocol
Session-state Reveal Ephemeral Key Reveal NAXOS key exchange protocol
2009/6/9
In the papers "Stronger Security of Authenticated Key Exchange" [LLM07, LLM06], a
new security model for key exchange protocols is proposed. The new model is suggested
to be at least as strong as pr...
Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS
efficient key agreement protocol (H)MQV NAXOS
2008/9/4
LaMacchia, Lauter and Mityagin recently presented a strong security
definition for authenticated key agreement strengthening the well-known
Canetti-Krawczyk definition. They also described a protoco...