Back to Results
First PageMeta Content
Machine learning / AKA / Secure Shell / Perfect forward secrecy / Data / Information / Computing / Cryptography / Cryptographic protocols / Learning with errors


Post-quantum Authenticated Key Exchange from Ideal Lattices ¨ u¨ r Dagdelen3 Jiang Zhang1 , Zhenfeng Zhang1,∗ , Jintai Ding2,∗ , Michael Snook2 , and Ozg 1 Institute of Software, Chinese Academy of Sciences, China
Add to Reading List

Document Date: 2015-04-09 11:41:32


Open Document

File Size: 843,24 KB

Share Result on Facebook

City

Lattice / /

Company

AES / /

Country

Germany / United States / China / /

Currency

GBP / /

/

Facility

Institute of Software / Darmstadt University of Technology / University of Cincinnati / /

IndustryTerm

specific applications / cryptographic tools / client-server based applications / secure communication protocols / communications channels / post-quantum authenticated key exchange protocol / basic protocol / insecure network / password-based authenticated key exchange protocol / passive-secure key exchange protocol / symmetric cryptographic tools / computing / quantum computing / /

NaturalFeature

confidential channel / /

Organization

Chinese Academy of Sciences / Initiation Party / Institute of Software / Darmstadt University of Technology / Certificate Authority / University of Cincinnati / Cincinnati / /

Person

Cha / Forward Secrecy / /

Position

randomness extractor / CPA / Forward / /

Product

Fujisaki-Okamoto / /

Technology

standardized protocols / pure post-quantum AKE protocol / HMQV Our AKE protocol / following algorithm / two-pass AKE protocol / DHlike KE protocol / provably secure two-pass AKE protocol / PKI / AKE protocols / password-based authenticated key exchange protocol / two protocols / secret key / three times encryptions / two-pass protocols / SSL / two-pass AKE protocols / NTRU encryption / DH protocol / resulting protocol / post-quantum authenticated key exchange protocol / cryptography / one encryption / PPT algorithm / secure communication protocols / public key / secure AKE protocol / passive-secure key exchange protocol / basic protocol / basic KE protocol / CPA-secure encryption / efficient AKE protocol / SIGMA protocol / KE protocol / two encryptions / HMQV protocol / AKE protocol / /

URL

http /

SocialTag