×

Found 52 Documents (Results 1–52)

Continuous after-the-fact leakage-resilient eCK-secure key exchange. (English) Zbl 1376.94024

Groth, Jens (ed.), Cryptography and coding. 15th IMA international conference, IMACC 2015, Oxford, UK, December 15–17, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-27238-2/pbk; 978-3-319-27239-9/ebook). Lecture Notes in Computer Science 9496, 277-294 (2015).
MSC:  94A60 94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI Link

One-round authenticated key exchange with strong forward secrecy in the standard model against constrained adversary. (English) Zbl 1292.94173

Hanaoka, Goichiro (ed.) et al., Advances in information and computer security. 7th international workshop on security, IWSEC 2012, Fukuoka, Japan, November 7–9, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34116-8/pbk). Lecture Notes in Computer Science 7631, 69-86 (2012).
MSC:  94A62 68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

On the security of TLS-DHE in the standard model. (English) Zbl 1296.94121

Safavi-Naini, Reihaneh (ed.) et al., Advances in cryptology – CRYPTO 2012. 32nd annual cryptology conference, Santa Barbara, CA, USA, August 19–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32008-8/pbk). Lecture Notes in Computer Science 7417, 273-293 (2012).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Strongly secure authenticated key exchange from factoring, codes, and lattices. (English) Zbl 1300.94106

Fischlin, Marc (ed.) et al., Public key cryptography – PKC 2012. 15th international conference on practice and theory in public key cryptography, Darmstadt, Germany, May 21–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-30056-1/pbk). Lecture Notes in Computer Science 7293, 467-484 (2012).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Another look at tightness. (English) Zbl 1279.94134

Miri, Ali (ed.) et al., Selected areas in cryptography. 18th international workshop, SAC 2011, Toronto, ON, Canada, August 11–12, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-28495-3/pbk). Lecture Notes in Computer Science 7118, 293-319 (2012).
MSC:  94A62 68M12
PDFBibTeX XMLCite
Full Text: DOI

On forward secrecy in one-round key exchange. (English) Zbl 1291.94063

Chen, Liqun (ed.), Cryptography and coding. 13th IMA international conference, IMACC 2011, Oxford, UK, December 12–15, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25515-1/pbk). Lecture Notes in Computer Science 7089, 451-468 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

A new spin on quantum cryptography: avoiding trapdoors and embracing public keys. (English) Zbl 1290.94090

Yang, Bo-Yin (ed.), Post-quantum cryptography. 4th international workshop, PQCrypto 2011, Taipei, Taiwan, November 29–December 2, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25404-8/pbk). Lecture Notes in Computer Science 7071, 255-274 (2011).
MSC:  94A60 81P94
PDFBibTeX XMLCite
Full Text: DOI arXiv

Characterization of strongly secure authenticated key exchanges without NAXOS technique. (English) Zbl 1344.94082

Iwata, Tetsu (ed.) et al., Advances in information and computer security. 6th international workshop, IWSEC 2011, Tokyo, Japan, November 8–10, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25140-5/pbk). Lecture Notes in Computer Science 7038, 33-50 (2011).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Strongly secure one round authenticated key exchange protocol with perfect forward security. (English) Zbl 1298.94121

Boyen, Xavier (ed.) et al., Provable security. 5th international conference, ProvSec 2011, Xi’an, China, October 16–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-24315-8/pbk). Lecture Notes in Computer Science 6980, 389-397 (2011).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

TMQV: a strongly eck-secure Diffie-Hellman protocol without gap assumption. (English) Zbl 1298.94124

Boyen, Xavier (ed.) et al., Provable security. 5th international conference, ProvSec 2011, Xi’an, China, October 16–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-24315-8/pbk). Lecture Notes in Computer Science 6980, 380-388 (2011).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Taxonomical security consideration of authenticated key exchange resilient to intermediate computation leakage. (English) Zbl 1298.94113

Boyen, Xavier (ed.) et al., Provable security. 5th international conference, ProvSec 2011, Xi’an, China, October 16–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-24315-8/pbk). Lecture Notes in Computer Science 6980, 348-365 (2011).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

A generic variant of NIST’S KAS2 key agreement protocol. (English) Zbl 1279.94062

Parampalli, Udaya (ed.) et al., Information security and privacy. 16th Australasian conference, ACISP 2011, Melbourne, Australia, July 11–13, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22496-6/pbk). Lecture Notes in Computer Science 6812, 353-370 (2011).
MSC:  94A60 94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI

Batch computations revisited: combining key computations and batch verifications. (English) Zbl 1290.94157

Biryukov, Alex (ed.) et al., Selected areas in cryptography. 17th international workshop, SAC 2010, Waterloo, Ontario, Canada, August 12–13, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-19573-0/pbk). Lecture Notes in Computer Science 6544, 130-142 (2011).
MSC:  94A62 14G50 68P25
PDFBibTeX XMLCite
Full Text: DOI

Stronger difficulty notions for client puzzles and denial-of-service-resistant protocols. (English) Zbl 1284.94113

Kiayias, Aggelos (ed.), Topics in cryptology – CT-RSA 2011. The cryptographers’ track at the RSA conference 2011, San Francisco, CA, USA, February 14–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19073-5/pbk). Lecture Notes in Computer Science 6558, 284-301 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Designing efficient authenticated key exchange resilient to leakage of ephemeral secret keys. (English) Zbl 1284.94137

Kiayias, Aggelos (ed.), Topics in cryptology – CT-RSA 2011. The cryptographers’ track at the RSA conference 2011, San Francisco, CA, USA, February 14–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19073-5/pbk). Lecture Notes in Computer Science 6558, 121-141 (2011).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Combined security analysis of the one- and three-pass unified model key agreement protocols. (English) Zbl 1253.94043

Gong, Guang (ed.) et al., Progress in cryptology – INDOCRYPT 2010. 11th international conference on cryptology in India, Hyderabad, India, December 12–15, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17400-1/pbk). Lecture Notes in Computer Science 6498, 49-68 (2010).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Generic compilers for authenticated key exchange. (English) Zbl 1253.94053

Abe, Masayuki (ed.), Advances in cryptology – ASIACRYPT 2010. 16th international conference on the theory and application of cryptology and information security, Singapore, December 5–9, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17372-1/pbk). Lecture Notes in Computer Science 6477, 232-249 (2010).
MSC:  94A60 68N20 94A62
PDFBibTeX XMLCite
Full Text: DOI

Ephemeral key leakage resilient and efficient ID-AKEs that can share identities, private and master keys. (English) Zbl 1252.94063

Joye, Marc (ed.) et al., Pairing-based cryptography – Pairing 2010. 4th international conference, Yamanaka Hot Spring, Japan, December 13–15, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17454-4/pbk). Lecture Notes in Computer Science 6487, 187-205 (2010).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Strongly secure two-pass attribute-based authenticated key exchange. (English) Zbl 1252.94117

Joye, Marc (ed.) et al., Pairing-based cryptography – Pairing 2010. 4th international conference, Yamanaka Hot Spring, Japan, December 13–15, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17454-4/pbk). Lecture Notes in Computer Science 6487, 147-166 (2010).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

A new security model for authenticated key agreement. (English) Zbl 1291.94197

Garay, Juan A. (ed.) et al., Security and cryptography for networks. 7th international conference, SCN 2010, Amalfi, Italy, September 13–15, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-15316-7/pbk). Lecture Notes in Computer Science 6280, 219-234 (2010).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI HAL

Degrees of security: protocol guarantees in the face of compromising adversaries. (English) Zbl 1287.94049

Dawar, Anuj (ed.) et al., Computer science logic. 24th international workshop, CSL 2010, 19th annual conference of the EACSL, Brno, Czech Republic, August 23–27, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-15204-7/pbk). Lecture Notes in Computer Science 6247, 1-18 (2010).
MSC:  94A60 68Q55
PDFBibTeX XMLCite
Full Text: DOI

Flexible group key exchange with on-demand computation of subgroup keys. (English) Zbl 1284.94049

Bernstein, Daniel J. (ed.) et al., Progress in cryptology – AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3–6, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-12677-2/pbk). Lecture Notes in Computer Science 6055, 351-368 (2010).
MSC:  94A60 68M12
PDFBibTeX XMLCite
Full Text: DOI Link

A study of two-party certificateless authenticated key-agreement protocols. (English) Zbl 1252.94099

Roy, Bimal (ed.) et al., Progress in cryptology – INDOCRYPT 2009. 10th international conference on cryptology in India, New Delhi, India, December 13–16, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-10627-9/pbk). Lecture Notes in Computer Science 5922, 57-71 (2009).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Reusing static keys in key agreement protocols. (English) Zbl 1252.94054

Roy, Bimal (ed.) et al., Progress in cryptology – INDOCRYPT 2009. 10th international conference on cryptology in India, New Delhi, India, December 13–16, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-10627-9/pbk). Lecture Notes in Computer Science 5922, 39-56 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman protocols. (English) Zbl 1267.94133

Pieprzyk, Josef (ed.) et al., Provable security. Third international conference, ProvSec 2009, Guangzhou, China, November 11–13, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-04641-4/pbk). Lecture Notes in Computer Science 5848, 183-197 (2009).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

An eCK-secure authenticated key exchange protocol without random oracles. (English) Zbl 1267.94126

Pieprzyk, Josef (ed.) et al., Provable security. Third international conference, ProvSec 2009, Guangzhou, China, November 11–13, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-04641-4/pbk). Lecture Notes in Computer Science 5848, 154-167 (2009).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Strongly secure certificateless key agreement. (English) Zbl 1248.94080

Shacham, Hovav (ed.) et al., Pairing-based cryptography – Pairing 2009. Third international conference Palo Alto, CA, USA, August 12–14, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-03297-4/pbk). Lecture Notes in Computer Science 5671, 206-230 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Towards denial-of-service-resilient key agreement protocols. (English) Zbl 1284.94114

Boyd, Colin (ed.) et al., Information security and privacy. 14th Australasian conference, ACISP 2009, Brisbane, Australia, July 1–3, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-02619-5/pbk). Lecture Notes in Computer Science 5594, 389-406 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Modeling key compromise impersonation attacks on group key exchange protocols. (English) Zbl 1227.94046

Jarecki, Stanisław (ed.) et al., Public key cryptography – PKC 2009. 12th international conference on practice and theory in public key cryptography, Irvine, CA, USA, March 18–20, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-00467-4/pbk). Lecture Notes in Computer Science 5443, 105-123 (2009).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Leaky random oracle. (Extended abstract). (English) Zbl 1204.94079

Baek, Joonsang (ed.) et al., Provable security. Second international conference, ProvSec 2008, Shanghai, China, October 30–November 1, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-88732-4/pbk). Lecture Notes in Computer Science 5324, 226-240 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Efficient and strongly secure password-based server aided key exchange (extended abstract). (English) Zbl 1203.94130

Roy Chowdhury, Dipanwita (ed.) et al., Progress in cryptology – INDOCRYPT 2008. 9th international conference on cryptology in India, Kharagpur, India, December 14–17, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-89753-8/pbk). Lecture Notes in Computer Science 5365, 172-184 (2008).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Stronger security of authenticated key exchange. (English) Zbl 1138.94381

Susilo, Willy (ed.) et al., Provable security. First international conference, ProvSec 2007, Wollongong, Australia, November 1–2, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-75669-9/pbk). Lecture Notes in Computer Science 4784, 1-16 (2007).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Authenticated key exchange and key encapsulation in the standard model. (English) Zbl 1153.94458

Kurosawa, Kaoru (ed.), Advances in cryptology – ASIACRYPT 2007. 13th international conference on the theory and application of cryptology and information security, Kuching, Malaysia, December 2-6, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-76899-9/pbk). Lecture Notes in Computer Science 4833, 474-484 (2007).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Secure cross-realm client-to-client password-based authenticated key exchange against undetectable on-line dictionary attacks. (English) Zbl 1195.94078

Boztaş, Serdar (ed.) et al., Applied algebra, algebraic algorithms and error-correcting codes. 17th international symposium, AAECC-17, Bangalore, India, December 16–20, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-77223-1/pbk). Lecture Notes in Computer Science 4851, 257-266 (2007).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

On the connection between signcryption and one-pass key establishment. (English) Zbl 1154.94389

Galbraith, Steven D. (ed.), Cryptography and coding. 11th IMA international conference, Cirencester, UK, December 18–20, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-77271-2/pbk). Lecture Notes in Computer Science 4887, 277-301 (2007).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI Link

Filter Results by …

Document Type

all top 5

Author

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software