scispace - formally typeset
A

Anton Mityagin

Researcher at Microsoft

Publications -  40
Citations -  1431

Anton Mityagin is an academic researcher from Microsoft. The author has contributed to research in topics: Authenticated Key Exchange & Key (cryptography). The author has an hindex of 17, co-authored 40 publications receiving 1345 citations. Previous affiliations of Anton Mityagin include University of California, San Diego & University of California, Los Angeles.

Papers
More filters
Book ChapterDOI

Stronger security of authenticated key exchange

TL;DR: In this paper, a more compact, integrated, and comprehensive formulation of the Canetti-Krawczyk security model for authenticated key exchange (AKE) protocols is presented.
Posted Content

The Power of Verification Queries in Message Authentication and Authenticated Encryption.

TL;DR: In this article, it was shown that allowing a message authentication adversary multiple verification attempts towards forgery is not equivalent to allowing it a single one, so that the notion of security that most message authentication schemes are proven to meet does not guarantee their security in practice.
Book ChapterDOI

Analysis of Neural Cryptography

TL;DR: This paper analyses the security of a new key exchange protocol proposed in [3], which is based on mutually learning neural networks, and shows that it can be broken in three different ways, and thus it is completely insecure.
Book ChapterDOI

Security analysis of KEA authenticated key exchange protocol

TL;DR: It is proved that the modified protocol, called KEA+, satisfies the strongest security requirements for authenticated key-exchange and that it retains some security even if a secret key of a party is leaked.
Book ChapterDOI

Append-only signatures

TL;DR: This work defines the security of AOS, presents concrete AOS schemes, and proves their security under standard assumptions, and finds that despite its simple definition, AOS is equivalent to Hierarchical Identity-based Signatures (HIBS) through efficient and security-preserving reductions.