Voir la notice de l'article provenant de la source Math-Net.Ru
@article{PDMA_2024_17_a12, author = {E. K. Alekseev and S. N. Kyazhin}, title = {Related-Key {Attacks} on {Signature-based} {Authenticated} {Key} {Establishment} {Protocols}}, journal = {Prikladnaya Diskretnaya Matematika. Supplement}, pages = {51--57}, publisher = {mathdoc}, number = {17}, year = {2024}, language = {ru}, url = {http://geodesic.mathdoc.fr/item/PDMA_2024_17_a12/} }
TY - JOUR AU - E. K. Alekseev AU - S. N. Kyazhin TI - Related-Key Attacks on Signature-based Authenticated Key Establishment Protocols JO - Prikladnaya Diskretnaya Matematika. Supplement PY - 2024 SP - 51 EP - 57 IS - 17 PB - mathdoc UR - http://geodesic.mathdoc.fr/item/PDMA_2024_17_a12/ LA - ru ID - PDMA_2024_17_a12 ER -
%0 Journal Article %A E. K. Alekseev %A S. N. Kyazhin %T Related-Key Attacks on Signature-based Authenticated Key Establishment Protocols %J Prikladnaya Diskretnaya Matematika. Supplement %D 2024 %P 51-57 %N 17 %I mathdoc %U http://geodesic.mathdoc.fr/item/PDMA_2024_17_a12/ %G ru %F PDMA_2024_17_a12
E. K. Alekseev; S. N. Kyazhin. Related-Key Attacks on Signature-based Authenticated Key Establishment Protocols. Prikladnaya Diskretnaya Matematika. Supplement, no. 17 (2024), pp. 51-57. http://geodesic.mathdoc.fr/item/PDMA_2024_17_a12/
[1] Alekseev E. K., Babueva A. A., and Zazykina O. A., AKE Zoo: 100 Two-Party Protocols (to be continued), Cryptology ePrint Archive, Paper 2023/1044, 2023
[2] Alekseev E. K. and Kyazhin S. N., “Probing the security landscape for authenticated key establishment protocols”, 12th Workshop CTCrypt 2023, Pre-proceedings, 2023, 67–82
[3] Babueva A. A. and Kyazhin S. N., “Public keys for e-coins: partially solved problem using signature with rerandomizable keys”, Prikladnaya diskretnaya matematika. Prilozhenie, 2023, no. 16, 110–114
[4] Babueva A. A., Kyazhin S. N., “Additivno svyazannye klyuchi podpisi: vzlomat nelzya ispolzovat”, XXVI Nauchno-praktich. konf. «RusKripto'2014», 2024 https://www.ruscrypto.ru/resource/archive/rc2024/files/05_babueva_kyazhin.pdf | Zbl
[5] Morita H., Schuldt J. C. N., Matsuda T., et al., “On the security of the Schnorr signature scheme and DSA against related-key attacks”, LNCS, 9558, 2016, 20–35 | MR | Zbl
[6] Krawczyk H., “The “SIGn-and-MAc” approach to authenticated Diffie — Hellman and its use in the IKE protocols”, LNCS, 2729, 2003, 400–425 | MR | Zbl
[7] Jeong I. R., Katz J., Lee D. H., One-Round Protocols for Two-Party Authenticated Key Exchange, 2008 https://www.cs.umd.edu/ ̃ jkatz/papers/1round_AKE.pdf
[8] Canetti R., Krawczyk H., “Analysis of key-exchange protocols and their use for building secure channels”, LNCS, 2045, 2001, 453–474 | MR | Zbl