4.3 Article

Efficient module learning with errors-based post-quantum password-authenticated key exchange

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

Achieving One-Round Password-Based Authenticated Key Exchange over Lattices

Zengpeng Li et al.

Summary: In this research, we propose a lattice-based one-round PAKE protocol with adaptive smoothness by introducing a lattice-based SPHF. We integrate the proposed SPHF into an existing one-round framework and provide rigorous security analysis. Furthermore, we explore the possibilities of achieving two-round PAKE and universal composable security, and demonstrate the potential application in the Internet of Things.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2022)

Article Computer Science, Hardware & Architecture

Anonymous Lightweight Chaotic Map-Based Authenticated Key Agreement Protocol for Industrial Internet of Things

Jangirala Srinivas et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2020)

Article Computer Science, Hardware & Architecture

Building and Studying a Password Store that Perfectly Hides Passwords from Itself

Maliheh Shirvanian et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2019)

Article Computer Science, Theory & Methods

Zipf's Law in Passwords

Ding Wang et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Proceedings Paper Computer Science, Information Systems

Frodo: Take off the Ring! Practical, Quantum-Secure Key Exchange from LWE

Joppe Bos et al.

CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2016)