2016
DOI: 10.1007/978-3-319-31517-1_11
|View full text |Cite
|
Sign up to set email alerts
|

On the Security of the (F)HMQV Protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
11
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(11 citation statements)
references
References 19 publications
0
11
0
Order By: Relevance
“…Approaching the urban environment of Maputo itself as reflecting Portuguese colonialism resonate with reading the very African cityscape as comprising sedimentations of exploitative violence and, more generally, being palimpsests of historical eras (Sarr 2020(Sarr [2016: 103-10). The vision, therefore, of achieving another form of the urban or polis under the guise of the FRELIMO party was key to the implementation of Afro-socialist politics after 1975.…”
Section: A P U T O : F R O M R E V O L U T I O N a R Y U T O P I A mentioning
confidence: 99%
“…Approaching the urban environment of Maputo itself as reflecting Portuguese colonialism resonate with reading the very African cityscape as comprising sedimentations of exploitative violence and, more generally, being palimpsests of historical eras (Sarr 2020(Sarr [2016: 103-10). The vision, therefore, of achieving another form of the urban or polis under the guise of the FRELIMO party was key to the implementation of Afro-socialist politics after 1975.…”
Section: A P U T O : F R O M R E V O L U T I O N a R Y U T O P I A mentioning
confidence: 99%
“…Fig. 6 shows TAGA based on the Fully Hashed Menezes-Qu-Vanstone protocol (FHMQV) [7], [8]. For TAGA we include service and location into the key confirmation step, yielding FHMQV CLS .…”
Section: ) Concept and Securitymentioning
confidence: 99%
“…However, automatic symbolic analysis is still not amenable to protocols that use multiplication in the DH group and addition of exponents such as the AKE protocols with implicit authentication. The MQV [16], and its development to FH-MQV [7], [8] have arguably the best combination of resilience properties while in particular the FHMQV also developed for efficiency. The FHMQV comes with a security proof in a cryptographic security model [7], [8].…”
Section: Appendix a Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Many other variants of HMQV have been proposed in the literature. [24][25][26][27][28][29] In the literature, there is an alternative method to ensure the authentication of the secret key by incorporating the one-way functions in the DH key agreement protocol 12,[30][31][32][33][34][35] in order to confirm the validity of the shared secret key.…”
mentioning
confidence: 99%