-
CMQV+
- Referenced in 38 articles
[sw06418]
- CMQV+: an authenticated key exchange protocol from CMQV Ustaoglu presents a secure and efficient ... key exchange protocol named CMQV, based on the design rationales of HMQV and NAXOS. Compared...
-
HMQV
- Referenced in 80 articles
[sw02714]
- authentication. In addition to great performance, the protocol has been designed to achieve a remarkable ... chosen by the NSA as the key exchange mechanism underlying “the next generation cryptography ... protocol can be proven secure in a rigorous model of key-exchange security. In order ... analyze the MQV protocol in the Canetti-Krawczyk model of key exchange. Unfortunately, we show...
-
TinyECC
- Referenced in 20 articles
[sw09089]
- digital signature scheme (ECDSA), a key exchange protocol (ECDH), and a public key encryption scheme...
-
Saber
- Referenced in 6 articles
[sw25250]
- describe a secure Diffie-Hellman type key exchange protocol, which is then transformed into ... finally into an IND-CCA secure key encapsulation mechanism using a post-quantum version...
-
CAKE
- Referenced in 4 articles
[sw23884]
- cryptosystems. Then, we present an authenticated key exchange protocol based on CAKE, which is suitable ... Key Exchange (IKE) standard. We prove that CAKE is IND-CPA secure, that the protocol ... promising candidate for post-quantum key exchange standardization...
-
FORSAKES
- Referenced in 2 articles
[sw21066]
- FORSAKES: a forward-secure authenticated key exchange protocol based on symmetric key-evolving schemes. This ... definition for forward-secure authenticated key exchange (AKE) protocols, which can be satisfied without depending ... assumption. The basic idea is to use key-evolving schemes (KES), where the long-term...
-
sHMQV
- Referenced in 1 article
[sw27450]
- sHMQV: an efficient key exchange protocol for power-limited devices. In this paper we focus ... designing authenticated key exchange protocols for practical scenarios where the party consists of a powerful ... Card, etc). HMQV and (s,r)OAKE protocols are the state ... inefficiency, we propose a variant of HMQV protocol, denoted sHMQV, under some new design rationales...
-
MoTE-ECC
- Referenced in 2 articles
[sw09247]
- body of research on “light-weight” security protocols and cryptographic primitives that are suitable ... MoTE-ECC, we take (ephemeral) ECDH key exchange between two nodes as example, which requires...
-
GAP
- Referenced in 3189 articles
[sw00320]
- GAP is a system for computational discrete algebra...
-
gmp
- Referenced in 282 articles
[sw00363]
- GMP is a free library for arbitrary precision...
-
HERMES
- Referenced in 9 articles
[sw00403]
- HERMES: An Automatic Tool for Verification of Secrecy...
-
Magma
- Referenced in 3315 articles
[sw00540]
- Computer algebra system (CAS). Magma is a large...
-
Mathematica
- Referenced in 6355 articles
[sw00554]
- Almost any workflow involves computing results, and that...
-
Matlab
- Referenced in 13544 articles
[sw00558]
- MATLAB® is a high-level language and interactive...
-
NTL
- Referenced in 220 articles
[sw00638]
- NTL is a high-performance, portable C++ library...
-
R
- Referenced in 9969 articles
[sw00771]
- R is a language and environment for statistical...
-
SageMath
- Referenced in 1994 articles
[sw00825]
- Sage (SageMath) is free, open-source math software...
-
SIMATH
- Referenced in 31 articles
[sw00861]
- SIMATH - a computer algebra system for number theoretic...
-
SINGULAR
- Referenced in 1508 articles
[sw00866]
- SINGULAR is a Computer Algebra system (CAS) for...
-
WordNet
- Referenced in 411 articles
[sw01777]
- WordNet® is a large lexical database of English...