• HMQV

  • Referenced in 80 articles [sw02714]
  • chosen by the NSA as the key exchange mechanism underlying “the next generation cryptography ... secure in a rigorous model of key-exchange security. In order to provide an answer ... Canetti-Krawczyk model of key exchange. Unfortunately, we show that MQV fails to a variety ... latter by knowing the private signature key...
  • CMQV+

  • Referenced in 38 articles [sw06418]
  • CMQV+: an authenticated key exchange protocol from CMQV Ustaoglu presents a secure and efficient ... key exchange protocol named CMQV, based on the design rationales of HMQV and NAXOS. Compared...
  • SIDH

  • Referenced in 16 articles [sw17952]
  • algorithms for supersingular isogeny Diffie-Hellman key exchange [1]. The chosen parameters aim to provide ... option of a hybrid key exchange that combines supersingular isogeny Diffie-Hellman with a high ... security classical elliptic curve Diffie-Hellman key exchange at a small overhead. SIDH...
  • TinyECC

  • Referenced in 20 articles [sw09089]
  • digital signature scheme (ECDSA), a key exchange protocol (ECDH), and a public key encryption scheme...
  • mpFq

  • Referenced in 19 articles [sw09337]
  • mpFq library and implementing curve-based key exchanges. We present a library for finite field ... present benchmarks on some curve-based public key cryptosystems...
  • Plutus

  • Referenced in 10 articles [sw22497]
  • reduce the number of cryptographic keys exchanged between users by using filegroups, distinguish file read...
  • Saber

  • Referenced in 6 articles [sw25250]
  • Saber: module-LWR based key exchange, CPA-secure encryption and CCA-secure KEM. In this ... describe a secure Diffie-Hellman type key exchange protocol, which is then transformed into ... finally into an IND-CCA secure key encapsulation mechanism using a post-quantum version...
  • OpenLB

  • Referenced in 28 articles [sw08549]
  • code that can be exchanged in the community. One key aspect of the OpenLB code...
  • CAKE

  • Referenced in 4 articles [sw23884]
  • encapsulation. Current widely-used key exchange (KE) mechanisms will be vulnerable to quantum attacks when ... cryptosystems. Then, we present an authenticated key exchange protocol based on CAKE, which is suitable ... Internet Key Exchange (IKE) standard. We prove that CAKE is IND-CPA secure, that ... promising candidate for post-quantum key exchange standardization...
  • FORSAKES

  • Referenced in 2 articles [sw21066]
  • FORSAKES: a forward-secure authenticated key exchange protocol based on symmetric key-evolving schemes. This ... definition for forward-secure authenticated key exchange (AKE) protocols, which can be satisfied without depending ... assumption. The basic idea is to use key-evolving schemes (KES), where the long-term...
  • slimgb

  • Referenced in 19 articles [sw00878]
  • monomial ordering. Further key features of the algorithm are parallel reductions, exchanging members...
  • CSIDH

  • Referenced in 2 articles [sw32093]
  • candidate for post quantum static-static key exchanges with very small keys. However, until...
  • MoTE-ECC

  • Referenced in 2 articles [sw09247]
  • MoTE-ECC, we take (ephemeral) ECDH key exchange between two nodes as example, which requires ... fixed base point (to generate a key pair), whereas the second scalar multiplication gets...
  • sHMQV

  • Referenced in 1 article [sw27450]
  • sHMQV: an efficient key exchange protocol for power-limited devices. In this paper we focus ... designing authenticated key exchange protocols for practical scenarios where the party consists of a powerful ... eliminating the validation of the ephemeral public keys, which costs one exponentiation; 2) the power...
  • MSP430X

  • Referenced in 1 article [sw32622]
  • supersingular isogeny Diffie-Hellman key exchange (SIDH), modular multiplication is the most expensive operation among...
  • DEECO

  • Referenced in 4 articles [sw33424]
  • dynamic component ensembles controlling data exchange. EBCS combine the key ideas of agents, ensemble-oriented...
  • MOMI

  • Referenced in 4 articles [sw09432]
  • communicate and exchange object-oriented code in a distributed context. MOMI’s key idea ... expected by the receiving site. The key feature of the paper is the definition ... subtyping is type-safe in that exchanged code is merged into local code without requiring...
  • Knockpy

  • Referenced in 1 article [sw41605]
  • Gaussian linear models with correlated exchangeable features. The key problem is that minimizing...
  • ProMoT

  • Referenced in 6 articles [sw02007]
  • analysis. For the application in Systems Biology key features of ProMoT are the development ... modeling-libraries, and the support for model-exchange via the international standard SBML. Of specific...
  • Venture

  • Referenced in 10 articles [sw14670]
  • approximate techniques. We also describe four key aspects of Venture’s implementation that build ... control flow, higher-order probabilistic procedures, partially exchangeable sequences and “likelihood-free” stochastic simulators...