• CMQV+

  • Referenced in 38 articles [sw06418]
  • CMQV+: an authenticated key exchange protocol from CMQV Ustaoglu presents a secure and efficient ... key exchange protocol named CMQV, based on the design rationales of HMQV and NAXOS. Compared...
  • HMQV

  • Referenced in 80 articles [sw02714]
  • authentication. In addition to great performance, the protocol has been designed to achieve a remarkable ... chosen by the NSA as the key exchange mechanism underlying “the next generation cryptography ... protocol can be proven secure in a rigorous model of key-exchange security. In order ... analyze the MQV protocol in the Canetti-Krawczyk model of key exchange. Unfortunately, we show...
  • TinyECC

  • Referenced in 20 articles [sw09089]
  • digital signature scheme (ECDSA), a key exchange protocol (ECDH), and a public key encryption scheme...
  • Saber

  • Referenced in 6 articles [sw25250]
  • describe a secure Diffie-Hellman type key exchange protocol, which is then transformed into ... finally into an IND-CCA secure key encapsulation mechanism using a post-quantum version...
  • CAKE

  • Referenced in 4 articles [sw23884]
  • cryptosystems. Then, we present an authenticated key exchange protocol based on CAKE, which is suitable ... Key Exchange (IKE) standard. We prove that CAKE is IND-CPA secure, that the protocol ... promising candidate for post-quantum key exchange standardization...
  • FORSAKES

  • Referenced in 2 articles [sw21066]
  • FORSAKES: a forward-secure authenticated key exchange protocol based on symmetric key-evolving schemes. This ... definition for forward-secure authenticated key exchange (AKE) protocols, which can be satisfied without depending ... assumption. The basic idea is to use key-evolving schemes (KES), where the long-term...
  • sHMQV

  • Referenced in 1 article [sw27450]
  • sHMQV: an efficient key exchange protocol for power-limited devices. In this paper we focus ... designing authenticated key exchange protocols for practical scenarios where the party consists of a powerful ... Card, etc). HMQV and (s,r)OAKE protocols are the state ... inefficiency, we propose a variant of HMQV protocol, denoted sHMQV, under some new design rationales...
  • MoTE-ECC

  • Referenced in 2 articles [sw09247]
  • body of research on “light-weight” security protocols and cryptographic primitives that are suitable ... MoTE-ECC, we take (ephemeral) ECDH key exchange between two nodes as example, which requires...
  • GAP

  • Referenced in 3189 articles [sw00320]
  • GAP is a system for computational discrete algebra...
  • gmp

  • Referenced in 282 articles [sw00363]
  • GMP is a free library for arbitrary precision...
  • HERMES

  • Referenced in 9 articles [sw00403]
  • HERMES: An Automatic Tool for Verification of Secrecy...
  • Magma

  • Referenced in 3315 articles [sw00540]
  • Computer algebra system (CAS). Magma is a large...
  • Mathematica

  • Referenced in 6355 articles [sw00554]
  • Almost any workflow involves computing results, and that...
  • Matlab

  • Referenced in 13544 articles [sw00558]
  • MATLAB® is a high-level language and interactive...
  • NTL

  • Referenced in 220 articles [sw00638]
  • NTL is a high-performance, portable C++ library...
  • R

  • Referenced in 9969 articles [sw00771]
  • R is a language and environment for statistical...
  • SageMath

  • Referenced in 1994 articles [sw00825]
  • Sage (SageMath) is free, open-source math software...
  • SIMATH

  • Referenced in 31 articles [sw00861]
  • SIMATH - a computer algebra system for number theoretic...
  • SINGULAR

  • Referenced in 1508 articles [sw00866]
  • SINGULAR is a Computer Algebra system (CAS) for...
  • WordNet

  • Referenced in 411 articles [sw01777]
  • WordNet® is a large lexical database of English...