References
- Mihir Bellare and Phillip Rogaway, "Entity authentication and key distribution," in Proc. of Advances in Cryptology - CRYPTO, pp.232-249, 1993.
- Ran Canetti and Hugo Krawczyk, "Analysis of key-exchange protocols and their use for building secure channels," in Proc. of Advances in Cryptology - EUROCRYPTO, pp.453-474, 2001.
- Mihir Bellare, David. Pointcheval and Phillip Rogaway, "Authenticated key exchange secure against dictionary attacks, " in Proc. of Advances in Cryptology - EUROCRYPTO, pp.139-155, 2000.
- Brian LaMacchia, Kristin Lauter and Anton. Mityagin, "Stronger security of authenticated key exchange," in Proc. of 1st Int. Conference on Provable Security, pp.1-16, 2007.
- Berkant Ustaoglu, "Obtaining a secure and efficient key agreement protocol from HMQV and NAXOS," in Designs, Codes and Cryptography, vol. 46, no. 3, pp. 329-342, 2008. https://doi.org/10.1007/s10623-007-9159-1
- Tatsuaki Okamoto, "Authenticated key exchange and key encapsulation without random oracles," in Cryptology ePrint Archive, Report 2007/473, 2007.
- Jooyoung Lee and Je Hong Park, "Authenticated key exchange secure under the computational Diffie-Hellman assumption," in Cryptology ePrint Archive, Report 2008/344, 2008.
- Jooyoung Lee and Choon Sik Park, "An efficient authenticated key exchange protocol with a tight security reduction," in Cryptology ePrint Archive, Report 2008/345, 2008.
- Jiang Wu and Berkant Ustaoglu, "Efficient key exchange with tight security reduction," in Cryptology ePrint Archive, Report 2009/288, 2009.
- Berkant Ustaoglu, "Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman protocols," in Proc. of 3rd Int. Conference on Provable Security, pp. 183-197, Springer, Heidelberg, 2009.
- Minkyu Kim, Atsushi Fujioka and Berkant Ustaoglu, "Strongly secure authenticated key exchange without NAXOS approach," in Proc. of International Workshop on Security, pp. 174-191, 2009.
- Augustin P. Sarr, Philippe Elbaz-Vincent and Jean-Claude Bajard, "A secure and efficient authenticated Diffie-Hellman protocol," in Proc. of EUROPKI 2009, pp. 83-998, 2009.
- Daisuke Moriyama and Tatsuaki Okamoto, "An eCK-secure authenticated key exchange protocol without random oracles," in Proc. of 3rd Int. Conference on Provable Security, pp.154-167, 2009.
- Hugo Krawczyk, "HMQV: A high-performance secure Diffie-Hellman protocol," in Proc. of Advances in Cryptology - CRYPTO, pp. 546-566, 2005.
- Ran Canetti, Oded Goldreich and Shai Halevi, "The random oracle model revisited," in Proc. of the 13th Annual ACM Symposium on the Theory of Computing, pp. 209-218, 1998.
Cited by
- Characterization of Strongly Secure Authenticated Key Exchanges without NAXOS Technique vol.ea96, pp.6, 2013, https://doi.org/10.1587/transfun.e96.a.1088