Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange Protocols
We revisit the SM2 protocol, which is widely used in Chinese commercial applications and by Chinese government agencies. Although it is by now standard practice for protocol designers to provide security proofs in widely accepted security models in order to assure protocol implementers of their secu...
Saved in:
Main Authors: | Ang Yang, Junghyun Nam, Moonseong Kim, Kim-Kwang Raymond Choo |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2014-01-01
|
Series: | The Scientific World Journal |
Online Access: | http://dx.doi.org/10.1155/2014/825984 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
On the Security of a Simple Three-Party Key Exchange Protocol without Server’s Public Keys
by: Junghyun Nam, et al.
Published: (2014-01-01) -
A Secure and Efficient White-Box Implementation of SM4
by: Xiaobo Hu, et al.
Published: (2024-12-01) -
Some Characterizations of w-Noetherian Rings and SM Rings
by: De Chuan Zhou, et al.
Published: (2022-01-01) -
Délcio Teobaldo - Pivetim. São Paulo: Edições SM, 2009.
by: Maria de Fátima Cruvinel
Published: (2010-01-01) -
Optimized SM4 Hardware Implementations for Low Area Consumption
by: Ruolin Zhang, et al.
Published: (2024-01-01)