Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Key exchange

Known as: Key-exchange algorithm, Key Exchange Algorithm, Kex 
Key exchange (also known as "key establishment") is any method in cryptography by which cryptographic keys are exchanged between two parties… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2015
Highly Cited
2015
At IEEE Security & Privacy 2015, Bos, Costello, Naehrig, and Stebila proposed an instantiation of Peikert's ring-learning-with… Expand
  • table 1
  • table 2
Is this relevant?
Highly Cited
2005
Highly Cited
2005
We propose and realize a definition of security for password-based key exchange within the framework of universally composable… Expand
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2005
Highly Cited
2005
In this paper, we quantify the energy cost of authentication and key exchange based on public-key cryptography on an 8-bit… Expand
  • figure 1
  • table 1
  • table 2
  • table 3
  • figure 2
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Secure and reliable group communication is an active area of research. Its popularity is fueled by the growing importance of… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2003
Highly Cited
2003
We consider the fundamental problem of authenticated group key exchange among n parties within a larger and insecure public… Expand
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Key establishment in sensor networks is a challenging problem because asymmetric key cryptosystems are unsuitable for use in… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Pairwise key establishment is a fundamental security service in sensor networks; it enables sensor nodes to communicate securely… Expand
  • figure 1
  • figure 2
  • figure 3
  • table I
  • figure 4
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Recently, Canetti and Krawczyk (Eurocrypt'2001) formulated a notion of security for key-exchange (ke) protocols, called SK… Expand
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Distributed Sensor Networks (DSNs) are ad-hoc mobile networks that include sensor nodes with limited computation and… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 4
Is this relevant?
Highly Cited
1999
Highly Cited
1999
  • V. Shoup
  • IACR Cryptol. ePrint Arch.
  • 1999
  • Corpus ID: 10999560
A new formal security model for session key exchange protocols in the public key setting is proposed, and several eecient… Expand
Is this relevant?