| Issue Date | Title | Author(s) |
1 | 2009 | Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman protocols (extended version) | Ustaoğlu, Berkant |
2 | 2008 | Comparing the pre- and post-specified peer models for key agreement | Menezes, Alfred; Ustaoğlu, Berkant |
3 | 2009 | Efficient key exchange with tight security reduction | Wu, Jiang; Ustaoğlu, Berkant |
4 | 2009 | Multi-party off-the-record messaging | Goldberg, Ian; Ustaoğlu, Berkant ; Van Gundy, Matthew D.; Chen, Hao |
5 | 2009 | Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS (extended version) | Ustaoğlu, Berkant |
6 | 2006 | On the importance of public-key validation in the MQV and HMQV key agreement protocols | Menezes, Alfred; Ustaoğlu, Berkant |
7 | 2009 | Reusing static keys in key agreement protocols | Chatterjee, Sanjit; Menezes, Alfred; Ustaoğlu, Berkant |
8 | 2008 | Security arguments for the UM key agreement protocol in the NIST SP 800-56A standard | Menezes, Alfred; Ustaoğlu, Berkant |
9 | 2009 | Strongly secure authenticated key exchange without NAXOS' approach | Kim, Minkyu; Fujioka, Atsushi; Ustaoğlu, Berkant |
10 | 2009 | Towards denial-of-service-resilient key agreement protocols | Stebila, Douglas; Ustaoğlu, Berkant |
11 | 2009 | Utilizing postponed ephemeral and pseudo-static keys in tripartite and identity-based key agreement protocols | Fujioka, Atsushi; Suzuki, Koutarou; Ustaoğlu, Berkant |