Author of the publication

ASICS: Authenticated Key Exchange Security Incorporating Certification Systems.

, , , , , and . ESORICS, volume 8134 of Lecture Notes in Computer Science, page 381-399. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal., and . Des. Codes Cryptogr., 74 (1): 183-218 (2015)One-round Strongly Secure Key Exchange with Perfect Forward Secrecy and Deniability., and . IACR Cryptol. ePrint Arch., (2011)On the Limits of Authenticated Key Exchange Security with an Application to Bad Randomness., and . IACR Cryptology ePrint Archive, (2014)Beyond eCK: Perfect Forward Secrecy under Actor Compromise and Ephemeral-Key Reveal., and . ESORICS, volume 7459 of Lecture Notes in Computer Science, page 734-751. Springer, (2012)Strengthening the security of authenticated key exchange against bad randomness., and . Des. Codes Cryptogr., 86 (3): 481-516 (2018)Strengthening the security of key exchange protocols.. ETH Zurich, Zürich, Switzerland, (2014)base-search.net (ftethz:oai:www.research-collection.ethz.ch:20.500.11850/84662).