Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Key exchange

Known as: Key-exchange algorithm, Key Exchange Algorithm, Kex 
Key exchange (also known as "key establishment") is any method in cryptography by which cryptographic keys are exchanged between two parties… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2016
Highly Cited
2016
At IEEE Security & Privacy 2015, Bos, Costello, Naehrig, and Stebila proposed an instantiation of Peikert's ring-learning-with… Expand
  • table 1
  • table 2
Highly Cited
2016
Highly Cited
2016
Lattice-based cryptography offers some of the most attractive primitives believed to be resistant to quantum computers. Following… Expand
  • figure I
  • figure II
  • table 1
  • table 2
  • table 3
Highly Cited
2005
Highly Cited
2005
We propose and realize a definition of security for password-based key exchange within the framework of universally composable… Expand
  • figure 3
  • figure 4
Highly Cited
2005
Highly Cited
2005
In this paper, we quantify the energy cost of authentication and key exchange based on public-key cryptography on an 8-bit… Expand
  • figure 1
  • table 1
  • table 2
  • table 3
  • figure 2
Highly Cited
2004
Highly Cited
2004
Secure and reliable group communication is an active area of research. Its popularity is fueled by the growing importance of… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2003
Highly Cited
2003
We consider the fundamental problem of authenticated group key exchange among n parties within a larger and insecure public… Expand
Highly Cited
2003
Highly Cited
2003
Key establishment in sensor networks is a challenging problem because asymmetric key cryptosystems are unsuitable for use in… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2002
Highly Cited
2002
Recently, Canetti and Krawczyk (Eurocrypt'2001) formulated a notion of security for key-exchange (ke) protocols, called SK… Expand
Highly Cited
2002
Highly Cited
2002
Distributed Sensor Networks (DSNs) are ad-hoc mobile networks that include sensor nodes with limited computation and… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 4
Highly Cited
2000
Highly Cited
2000
As a result of the increased popularity of group-oriented applications and protocols, group communication occurs in many… Expand
  • figure 1
  • figure 3
  • figure 4
  • figure 5
  • figure 6