| Keyword : authenticated key exchange
| |
|
Compact Authenticated Key Exchange from Bounded CCA-Secure KEM Kazuki YONEYAMA | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/01/01
Vol. E98-A
No. 1 ;
pp. 132-143
Type of Manuscript:
Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Public Key Based Cryptography Keyword: authenticated key exchange, key encapsulation mechanism, bounded CCA, | | Summary | Full Text:PDF(254.4KB) | |
| |
| |
|
One-Round Authenticated Key Exchange with Strong Forward Secrecy in the Standard Model against Constrained Adversary Kazuki YONEYAMA | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/06/01
Vol. E96-A
No. 6 ;
pp. 1124-1138
Type of Manuscript:
Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: Keyword: authenticated key exchange, strong forward secrecy, signcryption, | | Summary | Full Text:PDF(302.3KB) | |
|
Generic Construction of Two-Party Round-Optimal Attribute-Based Authenticated Key Exchange without Random Oracles Kazuki YONEYAMA | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/06/01
Vol. E96-A
No. 6 ;
pp. 1112-1123
Type of Manuscript:
Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: Keyword: authenticated key exchange, attribute-based authenticated key exchange, CK model, | | Summary | Full Text:PDF(258.6KB) | |
|
Strongly Secure Authenticated Key Exchange without NAXOS' Approach under Computational Diffie-Hellman Assumption Minkyu KIM Atsushi FUJIOKA Berkant USTAO LU | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/01/01
Vol. E95-A
No. 1 ;
pp. 29-39
Type of Manuscript:
Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Public Key Cryptography Keyword: authenticated key exchange, eCK model, NAXOS' approach, trapdoor test, | | Summary | Full Text:PDF(358.4KB) | |
| |
| |
| |
| |
| |
| |
|
|