A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is
IACR Cryptology ePrint Archive
In this work we extend the common Bellare-Rogaway model to capture breakdown resilience of key exchange protocols. ... Finally, we analyze the security of a generic hybrid key exchange protocol, formally showing how such designs ensure resilience against breakdowns of one of their key exchange components. ... This work has been co-funded by the DFG as part of project S4 within the CRC 1119 CROSSING and as part of project D.2 within the RTG 2050 "Privacy and Trust for Mobile Users." ...dblp:journals/iacr/BrendelFG17 fatcat:ixaxyx6d45cabiadb2xt4knziu
Key exchange protocols, first introduced by Diffie and Hellman in 1976, are one of the most widely-deployed cryptographic protocols. ... Security-wise, we generally demand of key exchange protocols to achieve key secrecy and authentication. ... Breakdown resilience of key exchange protocols. In Chapter 6 we introduce the notion of breakdown resilience for key exchange protocols. ...doi:10.25534/tuprints-00009642 fatcat:2edjtbzotbanjblfy4kv5e7rui