×

Found 65 Documents (Results 1–65)

Decaf: eliminating cofactors through point compression. (English) Zbl 1375.94133

Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-47988-9/pbk; 978-3-662-47989-6/ebook). Lecture Notes in Computer Science 9215, 705-723 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Strongly secure authenticated key exchange from factoring, codes, and lattices. (English) Zbl 1300.94106

Fischlin, Marc (ed.) et al., Public key cryptography – PKC 2012. 15th international conference on practice and theory in public key cryptography, Darmstadt, Germany, May 21–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-30056-1/pbk). Lecture Notes in Computer Science 7293, 467-484 (2012).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Another look at tightness. (English) Zbl 1279.94134

Miri, Ali (ed.) et al., Selected areas in cryptography. 18th international workshop, SAC 2011, Toronto, ON, Canada, August 11–12, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-28495-3/pbk). Lecture Notes in Computer Science 7118, 293-319 (2012).
MSC:  94A62 68M12
PDFBibTeX XMLCite
Full Text: DOI

A framework for practical universally composable zero-knowledge protocols. (English) Zbl 1227.94036

Lee, Dong Hoon (ed.) et al., Advances in cryptology – ASIACRYPT 2011. 17th international conference on the theory and application of cryptology and information security, Seoul, South Korea, December 4–8, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25384-3/pbk). Lecture Notes in Computer Science 7073, 449-467 (2011).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Characterization of strongly secure authenticated key exchanges without NAXOS technique. (English) Zbl 1344.94082

Iwata, Tetsu (ed.) et al., Advances in information and computer security. 6th international workshop, IWSEC 2011, Tokyo, Japan, November 8–10, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25140-5/pbk). Lecture Notes in Computer Science 7038, 33-50 (2011).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Strongly secure one round authenticated key exchange protocol with perfect forward security. (English) Zbl 1298.94121

Boyen, Xavier (ed.) et al., Provable security. 5th international conference, ProvSec 2011, Xi’an, China, October 16–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-24315-8/pbk). Lecture Notes in Computer Science 6980, 389-397 (2011).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

TMQV: a strongly eck-secure Diffie-Hellman protocol without gap assumption. (English) Zbl 1298.94124

Boyen, Xavier (ed.) et al., Provable security. 5th international conference, ProvSec 2011, Xi’an, China, October 16–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-24315-8/pbk). Lecture Notes in Computer Science 6980, 380-388 (2011).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Taxonomical security consideration of authenticated key exchange resilient to intermediate computation leakage. (English) Zbl 1298.94113

Boyen, Xavier (ed.) et al., Provable security. 5th international conference, ProvSec 2011, Xi’an, China, October 16–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-24315-8/pbk). Lecture Notes in Computer Science 6980, 348-365 (2011).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Highly-efficient universally-composable commitments based on the DDH assumption. (English) Zbl 1291.68037

Paterson, Kenneth G. (ed.), Advances in cryptology – EUROCRYPT 2011. 30th annual international conference on the theory and applications of cryptographic techniques, Tallinn, Estonia, May 15–19, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-20464-7/pbk). Lecture Notes in Computer Science 6632, 446-466 (2011).
MSC:  68M12 94A60
PDFBibTeX XMLCite
Full Text: DOI

One-pass HMQV and asymmetric key-wrapping. (English) Zbl 1291.94094

Catalano, Dario (ed.) et al., Public key cryptography – PKC 2011. 14th international conference on practice and theory in public key cryptography, Taormina, Italy, March 6–9, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19378-1/pbk). Lecture Notes in Computer Science 6571, 317-334 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Designing efficient authenticated key exchange resilient to leakage of ephemeral secret keys. (English) Zbl 1284.94137

Kiayias, Aggelos (ed.), Topics in cryptology – CT-RSA 2011. The cryptographers’ track at the RSA conference 2011, San Francisco, CA, USA, February 14–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19073-5/pbk). Lecture Notes in Computer Science 6558, 121-141 (2011).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Generic compilers for authenticated key exchange. (English) Zbl 1253.94053

Abe, Masayuki (ed.), Advances in cryptology – ASIACRYPT 2010. 16th international conference on the theory and application of cryptology and information security, Singapore, December 5–9, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17372-1/pbk). Lecture Notes in Computer Science 6477, 232-249 (2010).
MSC:  94A60 68N20 94A62
PDFBibTeX XMLCite
Full Text: DOI

A new security model for authenticated key agreement. (English) Zbl 1291.94197

Garay, Juan A. (ed.) et al., Security and cryptography for networks. 7th international conference, SCN 2010, Amalfi, Italy, September 13–15, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-15316-7/pbk). Lecture Notes in Computer Science 6280, 219-234 (2010).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI HAL

Degrees of security: protocol guarantees in the face of compromising adversaries. (English) Zbl 1287.94049

Dawar, Anuj (ed.) et al., Computer science logic. 24th international workshop, CSL 2010, 19th annual conference of the EACSL, Brno, Czech Republic, August 23–27, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-15204-7/pbk). Lecture Notes in Computer Science 6247, 1-18 (2010).
MSC:  94A60 68Q55
PDFBibTeX XMLCite
Full Text: DOI

Making the Diffie-Hellman protocol identity-based. (English) Zbl 1272.94030

Pieprzyk, Josef (ed.), Topics in cryptology – CT-RSA 2010. The cryptographers’ track at the RSA conference 2010, San Francisco, CA, USA, March 1–5, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-11924-8/pbk). Lecture Notes in Computer Science 5985, 165-178 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Efficient constructions of signcryption schemes and signcryption composability. (English) Zbl 1252.94085

Roy, Bimal (ed.) et al., Progress in cryptology – INDOCRYPT 2009. 10th international conference on cryptology in India, New Delhi, India, December 13–16, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-10627-9/pbk). Lecture Notes in Computer Science 5922, 321-342 (2009).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

A study of two-party certificateless authenticated key-agreement protocols. (English) Zbl 1252.94099

Roy, Bimal (ed.) et al., Progress in cryptology – INDOCRYPT 2009. 10th international conference on cryptology in India, New Delhi, India, December 13–16, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-10627-9/pbk). Lecture Notes in Computer Science 5922, 57-71 (2009).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman protocols. (English) Zbl 1267.94133

Pieprzyk, Josef (ed.) et al., Provable security. Third international conference, ProvSec 2009, Guangzhou, China, November 11–13, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-04641-4/pbk). Lecture Notes in Computer Science 5848, 183-197 (2009).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

An eCK-secure authenticated key exchange protocol without random oracles. (English) Zbl 1267.94126

Pieprzyk, Josef (ed.) et al., Provable security. Third international conference, ProvSec 2009, Guangzhou, China, November 11–13, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-04641-4/pbk). Lecture Notes in Computer Science 5848, 154-167 (2009).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Leakage-resilient public-key cryptography in the bounded-retrieval model. (English) Zbl 1252.94041

Halevi, Shai (ed.), Advances in cryptology – CRYPTO 2009. 29th annual international cryptology conference, Santa Barbara, CA, USA, August 16–20, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-03355-1/pbk). Lecture Notes in Computer Science 5677, 36-54 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Strongly secure certificateless key agreement. (English) Zbl 1248.94080

Shacham, Hovav (ed.) et al., Pairing-based cryptography – Pairing 2009. Third international conference Palo Alto, CA, USA, August 12–14, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-03297-4/pbk). Lecture Notes in Computer Science 5671, 206-230 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Password-authenticated group key agreement with adaptive security and contributiveness. (English) Zbl 1246.94017

Preneel, Bart (ed.), Progress in cryptology – AFRICACRYPT 2009. Second international conference on cryptology in Africa, Gammarth, Tunisia, June 21–25, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-02383-5/pbk). Lecture Notes in Computer Science 5580, 254-271 (2009).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI Link

Towards denial-of-service-resilient key agreement protocols. (English) Zbl 1284.94114

Boyd, Colin (ed.) et al., Information security and privacy. 14th Australasian conference, ACISP 2009, Brisbane, Australia, July 1–3, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-02619-5/pbk). Lecture Notes in Computer Science 5594, 389-406 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Modeling key compromise impersonation attacks on group key exchange protocols. (English) Zbl 1227.94046

Jarecki, Stanisław (ed.) et al., Public key cryptography – PKC 2009. 12th international conference on practice and theory in public key cryptography, Irvine, CA, USA, March 18–20, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-00467-4/pbk). Lecture Notes in Computer Science 5443, 105-123 (2009).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

A provably secure one-pass two-party key establishment protocol. (English) Zbl 1166.94332

Pei, Dingyi (ed.) et al., Information security and cryptology. Third SKLOIS conference, Inscrypt 2007, Xining, China, August 31–September 5, 2007. Revised selected papers. Berlin: Springer (ISBN 978-3-540-79498-1/pbk). Lecture Notes in Computer Science 4990, 108-122 (2008).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Constant-round authenticated group key exchange with logarithmic computation complexity. (English) Zbl 1214.94052

Katz, Jonathan (ed.) et al., Applied cryptography and network security. 5th international conference, ACNS 2007, Zhuhai, China, June 5–8, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-72737-8/pbk). Lecture Notes in Computer Science 4521, 158-176 (2007).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Strongly-secure identity-based key agreement and anonymous extension. (English) Zbl 1138.68403

Garay, Juan A. (ed.) et al., Information security. 10th international conference, ISC 2007, Valparaíso, Chile, October 9–12, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-75495-4/pbk). Lecture Notes in Computer Science 4779, 203-220 (2007).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Stronger security of authenticated key exchange. (English) Zbl 1138.94381

Susilo, Willy (ed.) et al., Provable security. First international conference, ProvSec 2007, Wollongong, Australia, November 1–2, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-75669-9/pbk). Lecture Notes in Computer Science 4784, 1-16 (2007).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Authenticated key exchange and key encapsulation in the standard model. (English) Zbl 1153.94458

Kurosawa, Kaoru (ed.), Advances in cryptology – ASIACRYPT 2007. 13th international conference on the theory and application of cryptology and information security, Kuching, Malaysia, December 2-6, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-76899-9/pbk). Lecture Notes in Computer Science 4833, 474-484 (2007).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

On the connection between signcryption and one-pass key establishment. (English) Zbl 1154.94389

Galbraith, Steven D. (ed.), Cryptography and coding. 11th IMA international conference, Cirencester, UK, December 18–20, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-77271-2/pbk). Lecture Notes in Computer Science 4887, 277-301 (2007).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI Link

(Password) authenticated key establishment: from 2-party to group. (English) Zbl 1129.94040

Vadhan, Salil P. (ed.), Theory of cryptography. 4th theory of cryptography conference, TCC 2007, Amsterdam, The Netherlands, February 21–24, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-70935-0/pbk). Lecture Notes in Computer Science 4392, 499-514 (2007).
MSC:  94A62 94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

A new key exchange protocol based on MQV assuming public computations. (English) Zbl 1152.94430

De Prisco, Roberto (ed.) et al., Security and cryptography for networks. 5th international conference, SCN 2006, Maiori, Italy, September 6–8, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-38080-1/pbk). Lecture Notes in Computer Science 4116, 186-200 (2006).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

About the security of MTI/C0 and MQV. (English) Zbl 1152.94429

De Prisco, Roberto (ed.) et al., Security and cryptography for networks. 5th international conference, SCN 2006, Maiori, Italy, September 6–8, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-38080-1/pbk). Lecture Notes in Computer Science 4116, 156-172 (2006).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

On the importance of public-key validation in the MQV and HMQV key agreement protocols. (English) Zbl 1175.94092

Barua, Rana (ed.) et al., Progress in cryptology – INDOCRYPT 2006. 7th international conference on cryptology in India, Kolkata, India, December 11-13, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-49767-7/pbk). Lecture Notes in Computer Science 4329, 133-147 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

The Cramer-Shoup encryption scheme is plaintext aware in the standard model. (English) Zbl 1140.94335

Vaudenay, Serge (ed.), Advances in cryptology – EUROCRYPT 2006. 25th annual international conference on the theory and applications of cryptographic techniques, St. Petersburg, Russia, May 28 – June 1, 2006. Proceedings. Berlin: Springer (ISBN 3-540-34546-9/pbk). Lecture Notes in Computer Science 4004, 289-307 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Security analysis of KEA authenticated key exchange protocol. (English) Zbl 1151.94532

Yung, Moti (ed.) et al., Public key cryptography – PKC 2006. 9th international conference on theory and practice of public-key cryptography, New York, NY, USA, April 24–26, 2006. Proceedings. Berlin: Springer (ISBN 3-540-33851-9/pbk). Lecture Notes in Computer Science 3958, 378-394 (2006).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Errors in computational complexity proofs for protocols. (English) Zbl 1154.68334

Roy, Bimal (ed.), Advances in cryptology – ASIACRYPT 2005. 11th international conference on the theory and application of cryptology and information security, Chennai, India, December 4–8, 2005, Proceedings. Berlin: Springer (ISBN 978-3-540-30684-9/pbk). Lecture Notes in Computer Science 3788, 624-643 (2005).
MSC:  68M12 68Q25 94A62
PDFBibTeX XMLCite
Full Text: DOI

HMQV: A high-performance secure Diffie-Hellman protocol. (Extended abstract). (English) Zbl 1145.94445

Shoup, Victor (ed.), Advances in cryptology – CRYPTO 2005. 25th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2005. Proceedings. Berlin: Springer (ISBN 3-540-28114-2/pbk). Lecture Notes in Computer Science 3621, 546-566 (2005).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Security of two-party identity-based key agreement. (English) Zbl 1126.94321

Dawson, Ed (ed.) et al., Progress in cryptology – Mycrypt 2005. First international conference on cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28–30, 2005. Proceedings. Berlin: Springer (ISBN 3-540-28938-0/pbk). Lecture Notes in Computer Science 3715, 229-243 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On session key construction in provably-secure key establishment protocols. (English) Zbl 1126.94324

Dawson, Ed (ed.) et al., Progress in cryptology – Mycrypt 2005. First international conference on cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28–30, 2005. Proceedings. Berlin: Springer (ISBN 3-540-28938-0/pbk). Lecture Notes in Computer Science 3715, 116-131 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

all top 5

Author

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software