4.3 Review

Reconciliation based key exchange schemes using lattices: a review

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

LBA-PAKE: Lattice-Based Anonymous Password Authenticated Key Exchange for Mobile Devices

Vivek Dabra et al.

Summary: The recent advancement in quantum computers poses a threat to traditional key exchange protocols, leading to the development of secure protocols for the postquantum era. Existing protocols, while simple and efficient, are vulnerable to various attacks, prompting the proposal of lattice-based anonymous password authenticated key exchange protocol to address these issues.

IEEE SYSTEMS JOURNAL (2021)

Article Computer Science, Information Systems

Provably secure two-party authenticated key agreement protocol for post-quantum environments

S. K. Hafizul Islam

JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2020)

Article Computer Science, Information Systems

Ideal Lattice-Based Anonymous Authentication Protocol for Mobile Devices

Qi Feng et al.

IEEE SYSTEMS JOURNAL (2019)

Article Computer Science, Theory & Methods

Post-Quantum Lattice-Based Cryptography Implementations: A Survey

Hamid Nejatollahi et al.

ACM COMPUTING SURVEYS (2019)

Proceedings Paper Computer Science, Information Systems

A Complete and Optimized Key Mismatch Attack on NIST Candidate NewHope

Yue Qin et al.

COMPUTER SECURITY - ESORICS 2019, PT II (2019)

Article Computer Science, Hardware & Architecture

Post-Quantum Key Exchange on ARMv8-A: A New Hope for NEON Made Simple

Silvan Streit et al.

IEEE TRANSACTIONS ON COMPUTERS (2018)

Article Computer Science, Information Systems

Comparing apples with apples: performance analysis of lattice-based authenticated key exchange protocols

Nina Bindel et al.

INTERNATIONAL JOURNAL OF INFORMATION SECURITY (2018)

Proceedings Paper Computer Science, Information Systems

Frodo: Take off the Ring! Practical, Quantum-Secure Key Exchange from LWE

Joppe Bos et al.

CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2016)

Proceedings Paper Computer Science, Theory & Methods

Post-quantum key exchange for the TLS protocol from the ring learning with errors problem

Joppe W. Bos et al.

2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015 (2015)

Proceedings Paper Computer Science, Information Systems

Authenticated Key Exchange from Ideal Lattices

Jiang Zhang et al.

ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT II (2015)

Article Computer Science, Hardware & Architecture

On Lattices, Learning with Errors, Random Linear Codes, and Cryptography

Oded Regev

JOURNAL OF THE ACM (2009)