: End-to-End Hybrid Authenticated Key Exchanges

S Bruckner, S Ramacher, C Striecks - International Conference on Post …, 2023‏ - Springer
End-to-end authenticity in public networks plays a significant role. Namely, without
authenticity, the adversary might be able to retrieve even confidential information straight …

Privacy-preserving authentication scheme with revocability for multi-WSN in industrial IoT

L **ong, T Peng, F Li, S Zeng, H Wu - IEEE Systems Journal, 2022‏ - ieeexplore.ieee.org
Wireless sensor network (WSN), as one of the core technology in the Industrial Internet of
Things (IIoT) system, plays a critical role in collecting data for the monitoring areas. Security …

Dynamic Group Time-Based One-Time Passwords

X Cao, Z Yang, J Ning, C **, R Lu… - IEEE Transactions on …, 2024‏ - ieeexplore.ieee.org
Group time-based one-time passwords (GTOTP) is a novel lightweight cryptographic
primitive for achieving anonymous client authentication, which enables the efficient …

Strongly anonymous ratcheted key exchange

B Dowling, E Hauck, D Riepel, P Rösler - … on the Theory and Application of …, 2022‏ - Springer
Anonymity is an (abstract) security goal that is especially important to threatened user
groups. Therefore, widely deployed communication protocols implement various measures …

Fake it till you make it: Enhancing security of bluetooth secure connections via deferrable authentication

M Fischlin, O Sanina - Proceedings of the 2024 on ACM SIGSAC …, 2024‏ - dl.acm.org
The Bluetooth protocol for wireless connection between devices comes with several security
measures to protect confidentiality and integrity of data. At the heart of these security …

Beyond Current Cryptography: Exploring New Frontiers

P Pappachan, M Rahaman… - Innovations in Modern …, 2024‏ - igi-global.com
Cryptography has evolved significantly, from simple ancient ciphers to sophisticated
algorithms to secure modern digital communications. The advent of quantum computing and …

[PDF][PDF] Report on evaluation of KpqC candidates

J Cottaar, K Hövelmanns, A Hülsing, T Lange… - Cryptology ePrint …, 2023‏ - eprint.iacr.org
This report covers our work on the submissions to the KpqC competition. We analyzed all
submitted KEMs and signature systems. For those that withstood cryptanalysis, we checked …

Privacy-preserving authenticated key exchange: stronger privacy and generic constructions

S Ramacher, D Slamanig, A Weninger - European Symposium on …, 2021‏ - Springer
Authenticated key-exchange (AKE) protocols are an important class of protocols that allow
two parties to establish a common session key over an insecure channel such as the …

Computational security analysis of the full EDHOC protocol

L Ferreira - Cryptographers' Track at the RSA Conference, 2024‏ - Springer
Abstract Ephemeral Diffie-Hellman Over COSE (EDHOC) is designed to be a compact and
lightweight authenticated key exchange protocol, providing mutual authentication, forward …

An Efficient Privacy-Preserving Access Control Scheme for Cloud Computing Services

L **ong, JK Wang, L Yu, N **ong… - IEEE Transactions on …, 2025‏ - ieeexplore.ieee.org
To meet the future system requirements of Cloud Computing Services (CCSs) for large
numbers of users, multiple services and high efficiency, authentication and access control …