Key exchange

Known as: Key-exchange algorithm, Key Exchange Algorithm, Kex 
Key exchange (also known as "key establishment") is any method in cryptography by which cryptographic keys are exchanged between two parties… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2015
Highly Cited
2015
Earlier in 2015, Bos, Costello, Naehrig, and Stebila (IEEE Security & Privacy 2015) proposed an instantiation of Peikert’s… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
  • figure 3
Is this relevant?
Highly Cited
2005
Highly Cited
2005
We propose and realize a definition of security for passwordbased key exchange within the framework of universally composable (UC… (More)
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2005
Highly Cited
2005
In this paper, we quantify the energy cost of authentication and key exchange based on public-key cryptography on an 8-bit… (More)
  • figure 1
  • table 1
  • table 2
  • table 3
  • figure 2
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Key establishment in sensor networks is a challenging problem because asymmetric key cryptosystems are unsuitable for use in… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Distributed Sensor Networks (DSNs) are ad-hoc mobile networks that include sensor nodes with limited computation and… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 4
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Recently, Canetti and Krawczyk (Eurocrypt’2001) formulated a notion of security for key-exchange (ke) protocols, called… (More)
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Secure and reliable group communication is an active area of research. Its popularity is fueled by the growing importance of… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Password-based key exchange schemes are designed to provide entities communicating over a public network, and sharing a (short… (More)
  • figure 1
  • figure 2
  • figure 5
  • figure 8
Is this relevant?
Highly Cited
1999
Highly Cited
1999
A new formal security model for session key exchange protocols in the public key setting is proposed, and several eecient… (More)
Is this relevant?
Highly Cited
1995
Highly Cited
1995
We discuss the issues involved in modelling and verifying key-exchange protocols within the framework of CSP and its model… (More)
Is this relevant?