Forward secrecy

Known as: PFS, FS, Key erasure 
In cryptography, forward secrecy (FS; also known as perfect forward secrecy) is a property of secure communication protocols in which compromise of… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2018
Highly Cited
2018
We investigate the security of Diffie-Hellman key exchange as used in popular Internet protocols and find it to be less secure… (More)
  • figure 1
  • table 1
  • figure 2
  • table 2
  • figure 3
Is this relevant?
Highly Cited
2013
Highly Cited
2013
We analyze physical-layer security based on the premise that the coding mechanism for secrecy over noisy channels is tied to the… (More)
Is this relevant?
2011
2011
Certificate less cryptography achieves the best of the two worlds: it inherits from identity-based techniques a solution to the… (More)
Is this relevant?
2009
2009
An elliptic curve-based signcryption scheme is introduced in this paper that effectively combines the functionalities of digital… (More)
  • figure 2
  • table 1
  • table 2
  • figure 4
Is this relevant?
2008
2008
This article presents new protocols for onion routing anonymity networks. We define a provably secure privacy-preserving key… (More)
  • figure 1
  • figure 2
  • table 1
Is this relevant?
Highly Cited
2006
Highly Cited
2006
We consider the transmission of confidential data over wireless channels with multiple communicating parties. Based on an… (More)
  • figure 1
  • figure 3
  • figure 4
  • figure 5
  • figure 7
Is this relevant?
2005
2005
A number of key establishment protocols claim the property of forward secrecy, where the compromise of a long-term key does not… (More)
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2004
Highly Cited
2004
We present Tor, a circuit-based low-latency anonymous communication service. This second-generation Onion Routing system… (More)
  • figure 1
Is this relevant?
2002
2002
Password-only authenticated key exchange (PAKE) protocols are designed to be secure even when users choose short, easilyguessed… (More)
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2000
Highly Cited
2000
One of the basic problems in cryptography is the generation of a common secret key between two parties, for instance in order to… (More)
Is this relevant?