Back to Results
First PageMeta Content
Public-key cryptography / Information / Secure Shell / AKA / Learning with errors / X Window System / MQV / Communications protocol / Cryptography / Cryptographic protocols / Data


Authenticated Key Exchange from Ideal Lattices ¨ ur Dagdelen3 Jiang Zhang1 , Zhenfeng Zhang1,∗ , Jintai Ding2,∗ , Michael Snook2 , and Ozg¨ 1 Institute of Software, Chinese Academy of Sciences, China
Add to Reading List

Document Date: 2014-09-30 10:34:44


Open Document

File Size: 500,46 KB

Share Result on Facebook

City

Lattice / /

Company

AES / /

Country

Germany / United States / China / /

/

Facility

Darmstadt University of Technology / Institute of Software / University of Cincinnati / /

IndustryTerm

basic protocol / insecure network / cryptographic tools / secure communication protocols / password-based authenticated key exchange protocol / communications channels / passive-secure key exchange protocol / symmetric cryptographic tools / computing / post-quantum authenticated key exchange protocol / quantum computing / /

Organization

Chinese Academy of Sciences / Darmstadt University of Technology / Certificate Authority / University of Cincinnati / Cincinnati / Institute of Software / /

Person

Forward Secrecy / /

Position

CPA / Forward / /

Technology

standardized protocols / pure post-quantum AKE protocol / post-quantum authenticated key exchange protocol / cryptography / following algorithm / HMQV Our AKE protocol / PPT algorithm / one encryption / secure communication protocols / public key / two-pass AKE protocol / secure AKE protocol / passive-secure key exchange protocol / PKI / provably secure two-pass AKE protocol / basic protocol / basic KE protocol / CPA-secure encryption / AKE protocols / twopass AKE protocol / DH-like KE protocol / password-based authenticated key exchange protocol / two protocols / secret key / SIGMA protocol / KE protocol / passive-secure KE protocol / three times encryptions / two encryptions / two-pass protocols / SSL / two-pass AKE protocols / NTRU encryption / HMQV protocol / DH protocol / AKE protocol / resulting protocol / /

URL

http /

SocialTag