All the current public-key cryptosystems will become insecure when size of a quantum register is sufficient. An authenticated key agreement protocol, which is against the attack of quantum computer, is proposed. The proposed protocol can provide the security properties known session key security, forward security, resistance to key-compromise impersonation attack and to unknown key-share attack, key control. We also prove its security in a widely accepted model
Recently, a large variety of Identity-Based Key Agreement protocols have tried to eliminate the use ...
We propose a security model for authenticated key establishment in the quantum setting. Our model is...
Isogeny-based cryptography is an instance of post-quantum cryptography whose fundamental problem con...
In this paper we propose a secure protocol for an authenticated key agreement based on the Diffie-He...
Progress in quantum technologies forces the development of new cryptographic primitives that are res...
In this paper we propose a secure protocol for authenticated key agreement based on Diffie-Hellman k...
A new general mathematical problem, suitable for public-key cryptosystems, is proposed: morphism com...
In 2016, NIST announced an open competition with the goal of finding and standardizing a suitable qu...
Quantum computation has drastically changed the concept of computationally hard problem. As a conseq...
Alice and Bob want to exchange information and make sure that an eavesdropper will not be able to li...
AbstractAuthenticated key agreement protocol must put in a nutshell of competent and strong cryptogr...
abstract: In the modern world with the ever growing importance of technology, the challenge of infor...
Password authenticated key establishment (PAKE) is a cryptographic primitive that allows two parties...
The goal of this project is to understand and analyze the supersingular isogeny Diffie Hellman (SIDH...
A key agreement protocol is designed for two or more entities to agree upon a shared secret key, whi...
Recently, a large variety of Identity-Based Key Agreement protocols have tried to eliminate the use ...
We propose a security model for authenticated key establishment in the quantum setting. Our model is...
Isogeny-based cryptography is an instance of post-quantum cryptography whose fundamental problem con...
In this paper we propose a secure protocol for an authenticated key agreement based on the Diffie-He...
Progress in quantum technologies forces the development of new cryptographic primitives that are res...
In this paper we propose a secure protocol for authenticated key agreement based on Diffie-Hellman k...
A new general mathematical problem, suitable for public-key cryptosystems, is proposed: morphism com...
In 2016, NIST announced an open competition with the goal of finding and standardizing a suitable qu...
Quantum computation has drastically changed the concept of computationally hard problem. As a conseq...
Alice and Bob want to exchange information and make sure that an eavesdropper will not be able to li...
AbstractAuthenticated key agreement protocol must put in a nutshell of competent and strong cryptogr...
abstract: In the modern world with the ever growing importance of technology, the challenge of infor...
Password authenticated key establishment (PAKE) is a cryptographic primitive that allows two parties...
The goal of this project is to understand and analyze the supersingular isogeny Diffie Hellman (SIDH...
A key agreement protocol is designed for two or more entities to agree upon a shared secret key, whi...
Recently, a large variety of Identity-Based Key Agreement protocols have tried to eliminate the use ...
We propose a security model for authenticated key establishment in the quantum setting. Our model is...
Isogeny-based cryptography is an instance of post-quantum cryptography whose fundamental problem con...