IoT-friendly AKE: Forward Secrecy and Session Resumption Meet Symmetric-key Cryptography
Gildas Avoine, Sébastien Canard and Loïc Ferreira
Strongly Secure Identity-Based Key Exchange with Single Pairing Operation
Junichi Tomida, Atsushi Fujioka, Akira Nagai and Koutarou Suzuki
A Complete and Optimized Key Mismatch Attack on NIST Candidate NewHope
Yue Qin, Chi Cheng and Jintai Ding
Breakdown Resilience of Key Exchange Protocols: NewHope, TLS 1.3, and Hybrids
Jacqueline Brendel, Marc Fischlin and Felix Günther