Hesse et al., 2025 - Google Patents
PAKE combiners and efficient post-quantum instantiationsHesse et al., 2025
View PDF- Document ID
- 8580609622896805659
- Author
- Hesse J
- Rosenberg M
- Publication year
- Publication venue
- Annual International Conference on the Theory and Applications of Cryptographic Techniques
External Links
Snippet
Much work has been done recently on developing password-authenticated key exchange (PAKE) mechanisms with post-quantum security. However, modern guidance recommends the use of hybrid schemes—schemes which rely on the combined hardness of a post …
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Ateniese et al. | Match me if you can: Matchmaking encryption and its applications | |
| Agrawal et al. | PASTA: password-based threshold authentication | |
| Aviram et al. | Session resumption protocols and efficient forward security for TLS 1.3 0-RTT | |
| Dowling et al. | A cryptographic analysis of the WireGuard protocol | |
| Cremers et al. | Automated analysis and verification of TLS 1.3: 0-RTT, resumption and delayed authentication | |
| Fischlin et al. | Self-guarding cryptographic protocols against algorithm substitution attacks | |
| Abdalla et al. | Password-authenticated key exchange from group actions | |
| Dowling et al. | Many a mickle makes a muckle: A framework for provably quantum-secure hybrid key exchange | |
| Bellare et al. | Nonces are noticed: AEAD revisited | |
| Gupta et al. | A novel and efficient lattice‐based authenticated key exchange protocol in C‐K Model | |
| Boldyreva et al. | On symmetric encryption with distinguishable decryption failures | |
| Alt et al. | A cryptographic analysis of umts/lte aka | |
| Menda et al. | Context discovery and commitment attacks: How to break ccm, eax, siv, and more | |
| Bradley et al. | Strong asymmetric PAKE based on trapdoor CKEM | |
| Santos et al. | Randomized half-ideal cipher on groups with applications to UC (a) PAKE | |
| Jutla et al. | Dual-system simulation-soundness with applications to UC-PAKE and more | |
| Li et al. | Two-round PAKE protocol over lattices without NIZK | |
| Hesse et al. | PAKE combiners and efficient post-quantum instantiations | |
| Poettering et al. | Asynchronous ratcheted key exchange | |
| Caforio et al. | Beyond security and efficiency: On-demand ratcheting with security awareness | |
| Liu et al. | EKE meets tight security in the Universally Composable framework | |
| Pan et al. | A generic construction of tightly secure password-based authenticated key exchange | |
| Barbosa et al. | Bare PAKE: universally composable key exchange from just passwords | |
| Ramacher et al. | Privacy-preserving authenticated key exchange: stronger privacy and generic constructions | |
| Backendal et al. | Puncturable key wrapping and its applications |