Alhussaini, Sulaiman; Collett, Craig; Sergeev, Sergeĭ Generalized Kotov-Ushakov attack on tropical Stickel protocol based on modified tropical circulant matrices. (English) Zbl 07980814 Kybernetika 60, No. 5, 603-623 (2024). MSC: 94A60 15A80 × Cite Format Result Cite Review PDF Full Text: DOI
Ferreira, Loïc; Pascal, Johan Post-quantum secure ZRTP. (English) Zbl 07977544 Saarinen, Markku-Juhani (ed.) et al., Post-quantum cryptography. 15th international workshop, PQCrypto 2024, Oxford, UK, June 12–14, 2024. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 14771, 3-36 (2024). MSC: 94A60 81P94 68P25 68M11 × Cite Format Result Cite Review PDF Full Text: DOI
Hanai, Shuya; Tanaka, Keisuke; Tezuka, Masayuki; Yoshida, Yusuke Universally composable relaxed asymmetric password-authenticated key exchange. (English) Zbl 07964927 Galdi, Clemente (ed.) et al., Security and cryptography for networks. 14th international conference, SCN 2024, Amalfi, Italy, September 11–13, 2024. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 14974, 272-293 (2024). MSC: 94A62 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Zhang, Xichen; Hashimoto, Keitaro; Ogata, Wakaha Security model for authenticated key exchange, reconsidered. (English) Zbl 07964926 Galdi, Clemente (ed.) et al., Security and cryptography for networks. 14th international conference, SCN 2024, Amalfi, Italy, September 11–13, 2024. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 14974, 251-271 (2024). MSC: 94A60 94A62 × Cite Format Result Cite Review PDF Full Text: DOI
Panchal, Jyoti; Chandra, Harish; Sing, Akanksha A new public key cryptography using generalized Fibonacci matrices. (English) Zbl 07959738 Surv. Math. Appl. 19, 301-316 (2024). MSC: 94A60 68P25 × Cite Format Result Cite Review PDF Full Text: Link
Bauer, Balthazar; Couteau, Geoffroy; Sadeghi, Elahe Fine-grained non-interactive key exchange, revisited. (English) Zbl 07953838 Reyzin, Leonid (ed.) et al., Advances in cryptology – CRYPTO 2024. 44th annual international cryptology conference, Santa Barbara, CA, USA, August 18–22, 2024. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 14921, 286-312 (2024). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Wang, Yuyu; Su, Chuanjie; Pan, Jiaxin Fine-grained non-interactive key-exchange without idealized assumptions. (English) Zbl 07953837 Reyzin, Leonid (ed.) et al., Advances in cryptology – CRYPTO 2024. 44th annual international cryptology conference, Santa Barbara, CA, USA, August 18–22, 2024. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 14921, 251-285 (2024). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Barbosa, Manuel; Gellert, Kai; Hesse, Julia; Jarecki, Stanislaw Bare PAKE: universally composable key exchange from just passwords. (English) Zbl 07953835 Reyzin, Leonid (ed.) et al., Advances in cryptology – CRYPTO 2024. 44th annual international cryptology conference, Santa Barbara, CA, USA, August 18–22, 2024. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 14921, 183-217 (2024). MSC: 94A62 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Pei, Junling; Fu, Fang-Wei MODRED: a code-based non-interactive key exchange protocol. (English) Zbl 07945744 Theor. Comput. Sci. 1021, Article ID 114943, 12 p. (2024). MSC: 94A60 94B99 × Cite Format Result Cite Review PDF Full Text: DOI
Pan, Jiaxin; Riepel, Doreen; Zeng, Runzhi Key exchange with tight (full) forward secrecy via key confirmation. (English) Zbl 07943697 Joye, Marc (ed.) et al., Advances in cryptology – EUROCRYPT 2024. 43rd annual international conference on the theory and applications of cryptographic techniques, Zurich, Switzerland, May 26–30, 2024. Proceedings. Part VII. Cham: Springer. Lect. Notes Comput. Sci. 14657, 59-89 (2024). MSC: 94A62 94A60 81P94 × Cite Format Result Cite Review PDF Full Text: DOI
Ferreira, Loïc Computational security analysis of the full EDHOC protocol. (English) Zbl 07941788 Oswald, Elisabeth (ed.), Topics in cryptology – CT-RSA 2024. Cryptographers’ track at the RSA conference 2024, San Francisco, CA, USA, May 6–9, 2024. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 14643, 25-48 (2024). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Huang, Huawei; Peng, Changgen; Deng, Lunzhi Cryptanalysis of a key exchange protocol based on a modified tropical structure. (English) Zbl 07938107 Des. Codes Cryptography 92, No. 11, 3843-3858 (2024). MSC: 94A60 16Y60 16W22 × Cite Format Result Cite Review PDF Full Text: DOI
Rahman, Nael; Shpilrain, Vladimir MOBS: matrices over bit strings public key exchange. (English) Zbl 1547.94410 Matematica 3, No. 3, 1198-1206 (2024). MSC: 94A60 15B36 05A05 × Cite Format Result Cite Review PDF Full Text: DOI arXiv
Alhussaini, Sulaiman; Collett, Craig; Sergeev, Sergeĭ On the tropical two-sided discrete logarithm and a key exchange protocol based on the tropical algebra of pairs. (English) Zbl 1547.94304 Commun. Algebra 52, No. 10, 4115-4134 (2024). MSC: 94A60 15A80 14T90 × Cite Format Result Cite Review PDF Full Text: DOI
Battarbee, Christopher; Kahrobaei, Delaram; Shahandashti, Siamak F. Semidirect product key exchange: the state of play. (English) Zbl 1544.94225 J. Algebra Appl. 23, No. 7, Article ID 2550066, 16 p. (2024). MSC: 94A60 81P94 × Cite Format Result Cite Review PDF Full Text: DOI arXiv
Campanelli, Matteo; Gennaro, Rosario; Melissaris, Kelsey; Nizzardo, Luca Witness-authenticated key exchange, revisited: extensions to groups, improved models, simpler constructions. (English) Zbl 1543.94713 Baldimtsi, Foteini (ed.) et al., Financial cryptography and data security. 27th international conference, FC 2023, Bol, Brač, Croatia, May 1–5, 2023. Revised selected papers. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13950, 112-128 (2024). MSC: 94A60 94A62 68P25 68N20 × Cite Format Result Cite Review PDF Full Text: DOI
de la Cruz, Javier; Villanueva-Polanco, Ricardo Public key cryptography based on twisted dihedral group algebras. (English) Zbl 1542.94121 Adv. Math. Commun. 18, No. 3, 857-877 (2024). MSC: 94A60 11T71 14G50 16S35 × Cite Format Result Cite Review PDF Full Text: DOI arXiv
Lyu, You; Liu, Shengli Two-message authenticated key exchange from public-key encryption. (English) Zbl 07860338 Tsudik, Gene (ed.) et al., Computer security – ESORICS 2023. 28th European symposium on research in computer security, The Hague, The Netherlands, September 25–29, 2023. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 14344, 414-434 (2024). MSC: 94A62 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Tiepelt, Marcel; Eaton, Edward; Stebila, Douglas Making an asymmetric PAKE quantum-annoying by hiding group elements. (English) Zbl 07860326 Tsudik, Gene (ed.) et al., Computer security – ESORICS 2023. 28th European symposium on research in computer security, The Hague, The Netherlands, September 25–29, 2023. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 14344, 168-188 (2024). MSC: 94A62 94A60 81P94 × Cite Format Result Cite Review PDF Full Text: DOI
Al-Saffar, N. F. H.; Alkhayyat, H. K. H.; Obaid, Z. K. A novel image encryption algorithm involving a logistic map and a self-invertible matrix. (English) Zbl 1540.94057 Malays. J. Math. Sci. 18, No. 1, 107-126 (2024). MSC: 94A60 94A08 × Cite Format Result Cite Review PDF Full Text: DOI
Chen, Teng; Lu, Dian-Jun; Deng, Zhi-Ming; Yao, Wei-Xin Quantum homomorphic aggregate signature based on quantum Fourier transform. (English) Zbl 1542.81342 Quantum Inf. Process. 23, No. 4, Paper No. 130, 33 p. (2024). MSC: 81P94 94A62 × Cite Format Result Cite Review PDF Full Text: DOI
Djimnaibeye, Sidoine; Ngom, Aminata; Sow, Djiby Post-quantum cryptography for healthcare: a number theory based two-factor mutual authentication and key exchange protocol over lattices for TMIS. (English) Zbl 1549.94023 Adv. Appl. Discrete Math. 41, No. 1, 1-26 (2024). MSC: 94A60 68P25 × Cite Format Result Cite Review PDF Full Text: DOI
Wang, Chaonan; Zhu, Hongfeng A hybrid dynamic \(N\)-party quantum key exchange protocol based on three-particle GHZ states. (English) Zbl 1542.81414 Quantum Inf. Process. 23, No. 3, Paper No. 64, 16 p. (2024). MSC: 81P94 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Sankaran, Janani; Arumugam, Chandrasekar Exploring the solution space: CB-WCA for efficient finite field multiplication in post-quantum cryptography. (English) Zbl 1542.81404 Quantum Inf. Process. 23, No. 1, Paper No. 28, 28 p. (2024). MSC: 81P94 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Wong, Denis C. K. Complete decomposition of dihedral groups with application to key exchange protocol. (English) Zbl 07955544 Asian-Eur. J. Math. 16, No. 5, Article ID 2350074, 16 p. (2023). MSC: 05B10 × Cite Format Result Cite Review PDF Full Text: DOI
Nakagawa, Kohei; Fujioka, Atsushi; Nagai, Akira; Tomida, Junichi; Xagawa, Keita; Yasuda, Kan Making the identity-based Diffie-Hellman key exchange efficiently revocable. (English) Zbl 1547.94398 Aly, Abdelrahaman (ed.) et al., Progress in cryptology – LATINCRYPT 2023. 8th international conference on cryptology and information security in Latin America, LATINCRYPT 2023, Quito, Ecuador, October 3–6, 2023. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 14168, 171-191 (2023). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Pan, Jiaxin; Wagner, Benedikt; Zeng, Runzhi Tighter security for generic authenticated key exchange in the QROM. (English) Zbl 1547.94461 Guo, Jian (ed.) et al., Advances in cryptology – ASIACRYPT 2023. 29th international conference on the theory and application of cryptology and information security, Guangzhou, China, December 4–8, 2023. Proceedings. Part IV. Singapore: Springer. Lect. Notes Comput. Sci. 14441, 401-433 (2023). MSC: 94A62 94A60 81P94 × Cite Format Result Cite Review PDF Full Text: DOI
Chen, Mingjie; Imran, Muhammad; Ivanyos, Gábor; Kutas, Péter; Leroux, Antonin; Petit, Christophe Hidden stabilizers, the isogeny to endomorphism ring problem and the cryptanalysis of pSIDH. (English) Zbl 1546.94061 Guo, Jian (ed.) et al., Advances in cryptology – ASIACRYPT 2023. 29th international conference on the theory and application of cryptology and information security, Guangzhou, China, December 4–8, 2023. Proceedings. Part III. Singapore: Springer. Lect. Notes Comput. Sci. 14440, 99-130 (2023). MSC: 94A60 14K02 × Cite Format Result Cite Review PDF Full Text: DOI arXiv HAL
Langrehr, Roman On the multi-user security of LWE-based NIKE. (English) Zbl 1543.94737 Rothblum, Guy (ed.) et al., Theory of cryptography. 21st international conference, TCC 2023, Taipei, Taiwan, November 29 – December 2, 2023. Proceedings. Part IV. Cham: Springer. Lect. Notes Comput. Sci. 14372, 33-62 (2023). MSC: 94A60 68P25 × Cite Format Result Cite Review PDF Full Text: DOI
McQuoid, Ian; Xu, Jiayu An efficient strong asymmetric PAKE compiler instantiable from group actions. (English) Zbl 1542.94158 Guo, Jian (ed.) et al., Advances in cryptology – ASIACRYPT 2023. 29th international conference on the theory and application of cryptology and information security, Guangzhou, China, December 4–8, 2023. Proceedings. Part VIII. Singapore: Springer. Lect. Notes Comput. Sci. 14445, 176-207 (2023). MSC: 94A62 94A60 68P25 68N20 × Cite Format Result Cite Review PDF Full Text: DOI
Pan, Jiaxin; Zeng, Runzhi A generic construction of tightly secure password-based authenticated key exchange. (English) Zbl 1542.94160 Guo, Jian (ed.) et al., Advances in cryptology – ASIACRYPT 2023. 29th international conference on the theory and application of cryptology and information security, Guangzhou, China, December 4–8, 2023. Proceedings. Part VIII. Singapore: Springer. Lect. Notes Comput. Sci. 14445, 143-175 (2023). MSC: 94A62 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Bootle, Jonathan; Faller, Sebastian; Hesse, Julia; Hostáková, Kristina; Ottenhues, Johannes Generalized fuzzy password-authenticated key exchange from error correcting codes. (English) Zbl 1542.94149 Guo, Jian (ed.) et al., Advances in cryptology – ASIACRYPT 2023. 29th international conference on the theory and application of cryptology and information security, Guangzhou, China, December 4–8, 2023. Proceedings. Part VIII. Singapore: Springer. Lect. Notes Comput. Sci. 14445, 110-142 (2023). MSC: 94A62 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Fondevik, Elsie Mestl; Gjøsteen, Kristian Modeling noise-accepting key exchange. (English) Zbl 1540.94062 Esser, Andre (ed.) et al., Code-based cryptography. 11th international workshop, CBCrypto 2023, Lyon, France, April 22–23, 2023. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 14311, 104-124 (2023). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Wei, Jianghong; Chen, Xiaofeng; Wang, Jianfeng; Susilo, Willy; You, Ilsun Towards secure asynchronous messaging with forward secrecy and mutual authentication. (English) Zbl 1537.94084 Inf. Sci. 626, 114-132 (2023). MSC: 94A62 94A60 68P25 68M11 × Cite Format Result Cite Review PDF Full Text: DOI
Bruckner, Sonja; Ramacher, Sebastian; Striecks, Christoph Muckle+: end-to-end hybrid authenticated key exchanges. (English) Zbl 1537.94047 Johansson, Thomas (ed.) et al., Post-quantum cryptography. 14th international workshop, PQCrypto 2023, College Park, MD, USA, August 16–18, 2023. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 14154, 601-633 (2023). MSC: 94A60 81P94 × Cite Format Result Cite Review PDF Full Text: DOI
Ramezanpour Naseri, Azadeh; Abbasi, Ahmad; Ebrahimi Atani, Reza A new public key cryptography using \(M_q\) matrix. (English) Zbl 07814830 J. Math. Model. 11, No. 4, 681-693 (2023). MSC: 94A60 11T71 11B39 × Cite Format Result Cite Review PDF Full Text: DOI
Pan, Jiaxin; Wagner, Benedikt; Zeng, Runzhi Lattice-based authenticated key exchange with tight security. (English) Zbl 1532.94057 Handschuh, Helena (ed.) et al., Advances in cryptology – CRYPTO 2023. 43rd annual international cryptology conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023. Proceedings. Part V. Cham: Springer. Lect. Notes Comput. Sci. 14085, 616-647 (2023). MSC: 94A60 94A62 81P94 × Cite Format Result Cite Review PDF Full Text: DOI
Ustimenko, V.; Klisowski, M. On new protocols of noncommutative cryptography in terms of homomorphism of stable multivariate transformation groups. (English) Zbl 1534.94097 Algebra Discrete Math. 35, No. 2, 220-250 (2023). MSC: 94A60 81P94 × Cite Format Result Cite Review PDF Full Text: DOI Link
Ishibashi, Ren; Yoneyama, Kazuki Compact password authenticated key exchange from group actions. (English) Zbl 1545.94066 Simpson, Leonie (ed.) et al., Information security and privacy. 28th Australasian conference, ACISP 2023, Brisbane, QLD, Australia, July 5–7, 2023. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13915, 220-247 (2023). MSC: 94A60 94A62 × Cite Format Result Cite Review PDF Full Text: DOI
Roy, Lawrence; Xu, Jiayu A universally composable PAKE with zero communication cost. (And why it shouldn’t be considered UC-secure). (English) Zbl 1527.94063 Boldyreva, Alexandra (ed.) et al., Public-key cryptography – PKC 2023. 26th IACR international conference on practice and theory of public-key cryptography, Atlanta, GA, USA, May 7–10, 2023. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13940, 714-743 (2023). MSC: 94A60 94A62 × Cite Format Result Cite Review PDF Full Text: DOI
Beguinet, Hugo; Chevalier, Céline; Pointcheval, David; Ricosset, Thomas; Rossi, Mélissa GeT a CAKE: Generic Transformations from Key encaspulation mechanisms to password Authenticated Key Exchanges. (English) Zbl 1542.94148 Tibouchi, Mehdi (ed.) et al., Applied cryptography and network security. 21st international conference, ACNS 2023, Kyoto, Japan, June 19–22, 2023. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13906, 516-538 (2023). MSC: 94A62 94A60 81P94 × Cite Format Result Cite Review PDF Full Text: DOI
Tran, Bénédikt; Vaudenay, Serge A gapless post-quantum hash proof system in the Hamming metric. (English) Zbl 1542.94144 Tibouchi, Mehdi (ed.) et al., Applied cryptography and network security. 21st international conference, ACNS 2023, Kyoto, Japan, June 19–22, 2023. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13905, 664-694 (2023). MSC: 94A60 94A62 68P25 81P94 81P68 × Cite Format Result Cite Review PDF Full Text: DOI
Arriaga, Afonso; Šala, Petra; Škrobot, Marjan Wireless-channel key exchange. (English) Zbl 1522.94032 Rosulek, Mike (ed.), Topics in cryptology – CT-RSA 2023. Cryptographers’ track at the RSA conference 2023, San Francisco, CA, USA, April 24–27, 2023. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13871, 672-699 (2023). MSC: 94A60 94A62 × Cite Format Result Cite Review PDF Full Text: DOI
Kiltz, Eike; Pan, Jiaxin; Riepel, Doreen; Ringerud, Magnus Multi-user CDH problems and the concrete security of \(\mathsf{NAXOS}\) and \(\mathsf{X3DH}\). (English) Zbl 1522.94065 Rosulek, Mike (ed.), Topics in cryptology – CT-RSA 2023. Cryptographers’ track at the RSA conference 2023, San Francisco, CA, USA, April 24–27, 2023. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13871, 645-671 (2023). MSC: 94A60 68P25 × Cite Format Result Cite Review PDF Full Text: DOI
Lyu, You; Liu, Shengli; Han, Shuai; Gu, Dawu Privacy-preserving authenticated key exchange in the standard model. (English) Zbl 1519.94170 Agrawal, Shweta (ed.) et al., Advances in cryptology – ASIACRYPT 2022. 28th international conference on the theory and application of cryptology and information security, Taipei, Taiwan, December 5–9, 2022. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 13793, 210-240 (2023). MSC: 94A60 94A62 × Cite Format Result Cite Review PDF Full Text: DOI
Dowling, Benjamin; Hauck, Eduard; Riepel, Doreen; Rösler, Paul Strongly anonymous ratcheted key exchange. (English) Zbl 1519.94109 Agrawal, Shweta (ed.) et al., Advances in cryptology – ASIACRYPT 2022. 28th international conference on the theory and application of cryptology and information security, Taipei, Taiwan, December 5–9, 2022. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 13793, 119-150 (2023). MSC: 94A60 94A62 × Cite Format Result Cite Review PDF Full Text: DOI
Bae, Seungyeon; Chang, Yousung; Park, Hyeongjin; Kim, Minseo; Shin, Youngjoo A performance evaluation of IPsec with post-quantum cryptography. (English) Zbl 07730580 Seo, Seung-Hyun (ed.) et al., Information security and cryptology – ICISC 2022. 25th international conference, ICISC 2022, Seoul, South Korea, November 30 – December 2, 2022. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 13849, 249-266 (2023). MSC: 68M25 68P25 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Besoul, Khaldoun; Mahmoud, Qassim Al; Alhalaybeh, Ayman Information theoretically secure key exchange algorithm. (English) Zbl 1549.94021 Adv. Appl. Discrete Math. 38, No. 1, 111-125 (2023). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Koppula, Venkata; Waters, Brent; Zhandry, Mark Adaptive multiparty NIKE. (English) Zbl 1519.94148 Kiltz, Eike (ed.) et al., Theory of cryptography. 20th international conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13748, 244-273 (2023). MSC: 94A60 68P25 68M14 × Cite Format Result Cite Review PDF Full Text: DOI
Boyd, Colin Key exchange. (English) Zbl 1519.94062 Pointcheval, David (ed.), Asymmetric cryptography. Primitives and protocols. London: ISTE; Hoboken, NJ: John Wiley & Sons. Sciences, 187-211 (2023). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Kahrobaei, Delaram; Stanojkovski, Mima Cryptographic multilinear maps using pro-\(p\) groups. (English) Zbl 1517.94113 Adv. Math. Commun. 17, No. 5, 1101-1114 (2023). MSC: 94A60 20D15 20E18 × Cite Format Result Cite Review PDF Full Text: DOI arXiv
Ullah, Shamsher; Zheng, Jiangbin; Din, Nizamud; Hussain, Muhammad Tanveer; Ullah, Farhan; Yousaf, Mahwish Elliptic curve cryptography; applications, challenges, recent advances, and future trends: a comprehensive survey. (English) Zbl 1545.94078 Comput. Sci. Rev. 47, Article ID 100530, 28 p. (2023). MSC: 94A60 94A62 14H52 68P25 × Cite Format Result Cite Review PDF Full Text: DOI
Isobe, Shuji; Koizumi, Eisuke A construction of encryption protocols over some semidirect products. (English) Zbl 1514.94102 J. Math. Cryptol. 17, Article ID 20220018, 24 p. (2023). MSC: 94A60 68P25 × Cite Format Result Cite Review PDF Full Text: DOI
Brown, Daniel R. L. Plactic key agreement (insecure?). (English) Zbl 1509.94073 J. Math. Cryptol. 17, Article ID 20220010, 22 p. (2023). MSC: 94A60 05E10 × Cite Format Result Cite Review PDF Full Text: DOI
Ahmed, K.; Pal, S.; Mohan, R. Key exchange protocol based upon a modified tropical structure. (English) Zbl 1502.94025 Commun. Algebra 51, No. 1, 214-223 (2023). MSC: 94A60 14T90 15A80 14G50 16Y60 × Cite Format Result Cite Review PDF Full Text: DOI
Meraouche, Ishak; Dutta, Sabyasachi; Tan, Haowen; Sakurai, Kouichi Tree parity machine-based symmetric encryption: a hybrid approach. (English) Zbl 07935367 Rushi Kumar, B (ed.) et al., Mathematics and computing. ICMC 2022. Proceedings of the 8th conference, Vellore, India, January 6–8, 2022. Singapore: Springer. Springer Proc. Math. Stat. 415, 61-73 (2022). MSC: 65-XX × Cite Format Result Cite Review PDF Full Text: DOI
Schwenk, Jörg; Stebila, Douglas A reduction-based proof for authentication and session key security in three-party Kerberos. (English) Zbl 1521.94066 Int. J. Appl. Cryptogr. 4, No. 2, 61-84 (2022). MSC: 94A62 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Ishibashi, Ren; Yoneyama, Kazuki Post-quantum anonymous one-sided authenticated key exchange without random oracles. (English) Zbl 1519.94139 Hanaoka, Goichiro (ed.) et al., Public-key cryptography – PKC 2022. 25th IACR international conference on practice and theory of public-key cryptography, virtual event, March 8–11, 2022. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13178, 35-65 (2022). MSC: 94A60 81P94 94A62 × Cite Format Result Cite Review PDF Full Text: DOI
Brendel, Jacqueline; Fiedler, Rune; Günther, Felix; Janson, Christian; Stebila, Douglas Post-quantum asynchronous deniable key exchange and the signal handshake. (English) Zbl 1519.94214 Hanaoka, Goichiro (ed.) et al., Public-key cryptography – PKC 2022. 25th IACR international conference on practice and theory of public-key cryptography, virtual event, March 8–11, 2022. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13178, 3-34 (2022). MSC: 94A62 94A60 94A12 81P94 × Cite Format Result Cite Review PDF Full Text: DOI Link
Jiang, Mingming; Liu, Shengli; Han, Shuai; Gu, Dawu Fuzzy authenticated key exchange with tight security. (English) Zbl 1524.94067 Atluri, Vijayalakshmi (ed.) et al., Computer security – ESORICS 2022. 27th European symposium on research in computer security, Copenhagen, Denmark, September 26–30, 2022. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13555, 337-360 (2022). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Dobson, Samuel; Galbraith, Steven D. Post-quantum signal key agreement from SIDH. (English) Zbl 1517.94093 Cheon, Jung Hee (ed.) et al., Post-quantum cryptography. 13th international workshop, PQCrypto 2022, virtual event, September 28–30, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13512, 422-450 (2022). MSC: 94A60 81P94 × Cite Format Result Cite Review PDF Full Text: DOI
Abdalla, Michel; Eisenhofer, Thorsten; Kiltz, Eike; Kunzweiler, Sabrina; Riepel, Doreen Password-authenticated key exchange from group actions. (English) Zbl 1517.94175 Dodis, Yevgeniy (ed.) et al., Advances in cryptology – CRYPTO 2022. 42nd annual international cryptology conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15–18, 2022. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13508, 699-728 (2022). MSC: 94A62 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Martínez, V. Gayoso; Encinas, L. Hernández; Muñoz, A. Martín A modification proposal for the reconciliation mechanism of the key exchange algorithm NewHope. (English) Zbl 1515.94083 Log. J. IGPL 30, No. 6, 1028-1040 (2022). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI Link
Ahmed, Kashif; Pal, Saibal; Mohan, Radha Some new semiring structures. (English) Zbl 1504.16079 Asian-Eur. J. Math. 15, No. 9, Article ID 2250173, 15 p. (2022). MSC: 16Y60 11D04 × Cite Format Result Cite Review PDF Full Text: DOI
Battarbee, Christopher; Kahrobaei, Delaram; Tailor, Dylan; Shahandashti, Siamak F. On the efficiency of a general attack against the MOBS cryptosystem. (English) Zbl 1505.94068 J. Math. Cryptol. 16, 289-297 (2022). MSC: 94A60 20M12 × Cite Format Result Cite Review PDF Full Text: DOI arXiv
Ren, Peixin; Gu, Xiaozhuo Practical post-quantum password-authenticated key exchange based-on module-lattice. (English) Zbl 07628047 Park, Jong Hwan (ed.) et al., Information security and cryptology – ICISC 2021. 24th international conference, Seoul, South Korea, December 1–3, 2021. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 13218, 137-156 (2022). MSC: 68M25 68P25 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Okano, Yuki; Tomida, Junichi; Nagai, Akira; Yoneyama, Kazuki; Fujioka, Atsushi; Suzuki, Koutarou Revocable hierarchical identity-based authenticated key exchange. (English) Zbl 07628041 Park, Jong Hwan (ed.) et al., Information security and cryptology – ICISC 2021. 24th international conference, Seoul, South Korea, December 1–3, 2021. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 13218, 3-27 (2022). MSC: 68M25 68P25 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Bettaieb, Slim; Bidoux, Loïc; Blazy, Olivier; Connan, Yann; Gaborit, Philippe A gapless code-based hash proof system based on RQC and its applications. (English) Zbl 1502.94030 Des. Codes Cryptography 90, No. 12, 3011-3044 (2022). MSC: 94A60 94A62 68P25 81P94 94B05 × Cite Format Result Cite Review PDF Full Text: DOI
Günther, Felix; Rastikian, Simon; Towa, Patrick; Wiggers, Thom KEMTLS with delayed forward identity protection in (almost) a single round trip. (English) Zbl 1514.94092 Ateniese, Giuseppe (ed.) et al., Applied cryptography and network security. 20th international conference, ACNS 2022, Rome, Italy, June 20–23, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13269, 253-272 (2022). MSC: 94A60 81P94 × Cite Format Result Cite Review PDF Full Text: DOI Link
Chi-Domínguez, Jesús-Javier; Rodríguez-Henríquez, Francisco Optimal strategies for CSIDH. (English) Zbl 1500.94022 Adv. Math. Commun. 16, No. 2, 383-411 (2022). MSC: 94A60 11T71 14L30 × Cite Format Result Cite Review PDF Full Text: DOI
Aragon, Nicolas; Blazy, Olivier; Deneuville, Jean-Christophe; Gaborit, Philippe; Zémor, Gilles Ouroboros: an efficient and provably secure KEM family. (English) Zbl 1515.94052 IEEE Trans. Inf. Theory 68, No. 9, 6233-6244 (2022). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Pan, Jiaxin; Qian, Chen; Ringerud, Magnus Signed (group) Diffie-Hellman key exchange with tight security. (English) Zbl 1498.94079 J. Cryptology 35, No. 4, Paper No. 26, 42 p. (2022). MSC: 94A60 94A62 × Cite Format Result Cite Review PDF Full Text: DOI
Jiang, Shaoquan; Chee, Yeow Meng; Ling, San; Wang, Huaxiong; Xing, Chaoping A new framework for deniable secure key exchange. (English) Zbl 1507.94063 Inf. Comput. 285, Part B, Article ID 104866, 23 p. (2022). MSC: 94A62 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Underwood, Robert G. Cryptography for secure encryption. (English) Zbl 1502.94004 Universitext. Cham: Springer (ISBN 978-3-030-97901-0/hbk; 978-3-030-97904-1/pbk). xii, 319 p. (2022). Reviewer: Manish Kumar (Hyderabad) MSC: 94-01 94A60 14G50 11G07 × Cite Format Result Cite Review PDF
Sharafi, J.; Daghigh, H. Application of algebraic-ring in key exchange protocol. (English) Zbl 1491.94066 J. Linear Topol. Algebra 11, No. 1, 69-75 (2022). Reviewer: Riccardo Aragona (L’Aquila) MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Alawatugoda, Janaka; Okamoto, Tatsuaki Standard model leakage-resilient authenticated key exchange using inner-product extractors. (English) Zbl 1485.94049 Des. Codes Cryptography 90, No. 4, 1059-1079 (2022). MSC: 94A60 94A62 × Cite Format Result Cite Review PDF Full Text: DOI
Brown, Daniel R. L.; Koblitz, Neal; LeGrow, Jason T. Cryptanalysis of “MAKE”. (English) Zbl 1484.94017 J. Math. Cryptol. 16, 98-102 (2022). MSC: 94A60 11T71 15B33 20H20 × Cite Format Result Cite Review PDF Full Text: DOI
Rahman, Nael; Shpilrain, Vladimir MAKE: a matrix action key exchange. (English) Zbl 1483.94053 J. Math. Cryptol. 16, 64-72 (2022). MSC: 94A60 20H20 × Cite Format Result Cite Review PDF Full Text: DOI arXiv
Roman’kov, Vitaly An improvement of the Diffie-Hellman noncommutative protocol. (English) Zbl 1482.94057 Des. Codes Cryptography 90, No. 1, 139-153 (2022). Reviewer: Riccardo Aragona (L’Aquila) MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Craven, Matthew J.; Woodward, John R. Evolution of group-theoretic cryptology attacks using hyper-heuristics. (English) Zbl 1487.94108 J. Math. Cryptol. 16, 49-63 (2022). MSC: 94A60 20P05 68W30 90C27 × Cite Format Result Cite Review PDF Full Text: DOI arXiv
Guo, Siyao; Kamath, Pritish; Rosen, Alon; Sotiraki, Katerina Limits on the efficiency of (ring) LWE-based non-interactive key exchange. (English) Zbl 1479.94183 J. Cryptology 35, No. 1, Paper No. 1, 24 p. (2022). Reviewer: Roberto Civino (L’Aquila) MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Xiao, Yuting; Zhang, Rui; Ma, Hui Modular design of role-symmetric authenticated key exchange protocols. (English) Zbl 1514.94141 Tibouchi, Mehdi (ed.) et al., Advances in cryptology – ASIACRYPT 2021. 27th international conference on the theory and application of cryptology and information security, Singapore, December 6–10, 2021. Proceedings. Part IV. Cham: Springer. Lect. Notes Comput. Sci. 13093, 742-772 (2021). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Boyd, Colin; Davies, Gareth T.; De Kock, Bor; Gellert, Kai; Jager, Tibor; Millerjord, Lise Symmetric key exchange with full forward security and robust synchronization. (English) Zbl 1514.94049 Tibouchi, Mehdi (ed.) et al., Advances in cryptology – ASIACRYPT 2021. 27th international conference on the theory and application of cryptology and information security, Singapore, December 6–10, 2021. Proceedings. Part IV. Cham: Springer. Lect. Notes Comput. Sci. 13093, 681-710 (2021). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Hesse, Julia; Hofheinz, Dennis; Kohl, Lisa; Langrehr, Roman Towards tight adaptive security of non-interactive key exchange. (English) Zbl 1511.94110 Nissim, Kobbi (ed.) et al., Theory of cryptography. 19th international conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 13044, 286-316 (2021). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI Link
Riyal, Ansh; Kumar, Geetansh; Sharma, Deepak Kumar Pairing-based cryptography. (English) Zbl 1504.94181 Bin Ahmad, Khairol Amali (ed.) et al., Functional encryption. Cham: Springer. EAI/Springer Innov. Commun. Comput., 79-101 (2021). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Suzuki, Keita; Nuida, Koji An improvement of a key exchange protocol relying on polynomial maps. (English) Zbl 1500.94051 Int. J. Math. Ind. 13, No. 1, Article ID 2250002, 13 p. (2021). MSC: 94A60 68P25 81P94 11T55 × Cite Format Result Cite Review PDF Full Text: DOI arXiv
Fischlin, Marc; Müller, Sven-André; Münch, Jean-Pierre; Porth, Lars Multipath TLS 1.3. (English) Zbl 1505.94070 Bertino, Elisa (ed.) et al., Computer security – ESORICS 2021. 26th European symposium on research in computer security, Darmstadt, Germany, October 4–8, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12973, 86-105 (2021). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Genêt, Aymeric; de Guertechin, Natacha Linard; Kaluđerović, Novak Full key recovery side-channel attack against ephemeral SIKE on the cortex-M4. (English) Zbl 1491.94050 Bhasin, Shivam (ed.) et al., Constructive side-channel analysis and secure design. 12th international workshop, COSADE 2021, Lugano, Switzerland, October 25–27, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12910, 228-254 (2021). MSC: 94A60 81P94 68P25 × Cite Format Result Cite Review PDF Full Text: DOI
Bindel, Nina; Stebila, Douglas; Veitch, Shannon Improved attacks against key reuse in learning with errors key exchange. (English) Zbl 1491.94039 Longa, Patrick (ed.) et al., Progress in cryptology – LATINCRYPT 2021. 7th international conference on cryptology and information security in Latin America, Bogotá, Colombia, October 6–8, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12912, 168-188 (2021). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Gu, Yanqi; Jarecki, Stanislaw; Krawczyk, Hugo KHAPE: Asymmetric PAKE from key-hiding key exchange. (English) Zbl 1489.94097 Malkin, Tal (ed.) et al., Advances in cryptology – CRYPTO 2021. 41st annual international cryptology conference, CRYPTO 2021, virtual event, August 16–20, 2021. Proceedings. Part IV. Cham: Springer. Lect. Notes Comput. Sci. 12828, 701-730 (2021). MSC: 94A60 68P25 94A62 × Cite Format Result Cite Review PDF Full Text: DOI
Han, Shuai; Jager, Tibor; Kiltz, Eike; Liu, Shengli; Pan, Jiaxin; Riepel, Doreen; Schäge, Sven Authenticated key exchange and signatures with tight security in the standard model. (English) Zbl 1489.94123 Malkin, Tal (ed.) et al., Advances in cryptology – CRYPTO 2021. 41st annual international cryptology conference, CRYPTO 2021, virtual event, August 16–20, 2021. Proceedings. Part IV. Cham: Springer. Lect. Notes Comput. Sci. 12828, 670-700 (2021). MSC: 94A62 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
de Quehen, Victoria; Kutas, Péter; Leonardi, Chris; Martindale, Chloe; Panny, Lorenz; Petit, Christophe; Stange, Katherine E. Improved torsion-point attacks on SIDH variants. (English) Zbl 1489.94094 Malkin, Tal (ed.) et al., Advances in cryptology – CRYPTO 2021. 41st annual international cryptology conference, CRYPTO 2021, virtual event, August 16–20, 2021. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 12827, 432-470 (2021). MSC: 94A60 81P94 11G20 14H52 11G07 × Cite Format Result Cite Review PDF Full Text: DOI arXiv Link
LeGrow, Jason T.; Hutchinson, Aaron (Short paper) Analysis of a strong fault attack on static/ephemeral CSIDH. (English) Zbl 1496.94056 Nakanishi, Toru (ed.) et al., Advances in information and computer security. 16th international workshop on security, IWSEC 2021, virtual event, September 8–10, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12835, 216-226 (2021). MSC: 94A60 81P94 × Cite Format Result Cite Review PDF Full Text: DOI
de Kock, Bor; Gjøsteen, Kristian; Veroni, Mattia Practical isogeny-based key-exchange with optimal tightness. (English) Zbl 1485.94079 Dunkelman, Orr (ed.) et al., Selected areas in cryptography. 27th international conference, Halifax, NS, Canada (virtual event), October 21–23, 2020. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 12804, 451-479 (2021). MSC: 94A60 81P94 × Cite Format Result Cite Review PDF Full Text: DOI
Brendel, Jacqueline; Fischlin, Marc; Günther, Felix; Janson, Christian; Stebila, Douglas Towards post-quantum security for signal’s X3DH handshake. (English) Zbl 1485.94065 Dunkelman, Orr (ed.) et al., Selected areas in cryptography. 27th international conference, Halifax, NS, Canada (virtual event), October 21–23, 2020. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 12804, 404-430 (2021). MSC: 94A60 81P94 × Cite Format Result Cite Review PDF Full Text: DOI Link
Kawashima, Tomoki; Takashima, Katsuyuki; Aikawa, Yusuke; Takagi, Tsuyoshi An efficient authenticated key exchange from random self-reducibility on CSIDH. (English) Zbl 07497440 Hong, Deukjo (ed.), Information security and cryptology – ICISC 2020. 23rd international conference, Seoul, South Korea, December 2–4, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12593, 58-84 (2021). MSC: 68P25 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Eaton, Edward; Stebila, Douglas The “Quantum annoying” property of password-authenticated key exchange protocols. (English) Zbl 1487.81065 Cheon, Jung Hee (ed.) et al., Post-quantum cryptography. 12th international workshop, PQCrypto 2021, Daejeon, South Korea, July 20–22, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12841, 154-173 (2021). MSC: 81P94 81P70 94A62 94A60 14A21 × Cite Format Result Cite Review PDF Full Text: DOI
Yap, E. Y. Y.; Chin, J. J.; Goh, A. A chronological review of key establishment models and protocols. (English) Zbl 1485.94150 Malays. J. Math. Sci. 15, Spec. Iss.: New Ideas in Cryptology, 39-61 (2021). MSC: 94A62 81P94 94A60 × Cite Format Result Cite Review PDF Full Text: Link
Davis, Hannah; Günther, Felix Tighter proofs for the SIGMA and TLS 1.3 key exchange protocols. (English) Zbl 1491.94044 Sako, Kazue (ed.) et al., Applied cryptography and network security. 19th international conference, ACNS 2021, Kamakura, Japan, June 21–24, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12727, 448-479 (2021). MSC: 94A60 68P25 × Cite Format Result Cite Review PDF Full Text: DOI Link
Ishibashi, Ren; Yoneyama, Kazuki Adaptive-ID secure hierarchical ID-based authenticated key exchange under standard assumptions without random oracles. (English) Zbl 1489.68047 Sako, Kazue (ed.) et al., Applied cryptography and network security. 19th international conference, ACNS 2021, Kamakura, Japan, June 21–24, 2021. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12726, 3-27 (2021). MSC: 68M25 94A60 × Cite Format Result Cite Review PDF Full Text: DOI