×

Found 31 Documents (Results 1–31)

Efficient modular exponentiation-based puzzles for denial-of-service protection. (English) Zbl 1369.94565

Kim, Howon (ed.), Information security and cryptology – ICISC 2011. 14th international conference, Seoul, Korea, November 30–December 2, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-31911-2/pbk). Lecture Notes in Computer Science 7259, 319-331 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Minimizing information leakage of tree-based RFID authentication protocols using alternate tree-walking. (English) Zbl 1308.94079

Susilo, Willy (ed.) et al., Information security and privacy. 17th Australasian conference, ACISP 2012, Wollongong, NSW, Australia, July 9–11, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-31447-6/pbk). Lecture Notes in Computer Science 7372, 434-441 (2012).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI Link

Effort-release public-key encryption from cryptographic puzzles. (English) Zbl 1305.94075

Susilo, Willy (ed.) et al., Information security and privacy. 17th Australasian conference, ACISP 2012, Wollongong, NSW, Australia, July 9–11, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-31447-6/pbk). Lecture Notes in Computer Science 7372, 194-207 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Towards a provably secure DoS-resilient key exchange protocol with perfect forward secrecy. (English) Zbl 1291.94115

Bernstein, Daniel J. (ed.) et al., Progress in cryptology – INDOCRYPT 2011. 12th international conference on cryptology in India, Chennai, India, December 11–14, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25577-9/pbk). Lecture Notes in Computer Science 7107, 379-398 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

On forward secrecy in one-round key exchange. (English) Zbl 1291.94063

Chen, Liqun (ed.), Cryptography and coding. 13th IMA international conference, IMACC 2011, Oxford, UK, December 12–15, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25515-1/pbk). Lecture Notes in Computer Science 7089, 451-468 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Stronger difficulty notions for client puzzles and denial-of-service-resistant protocols. (English) Zbl 1284.94113

Kiayias, Aggelos (ed.), Topics in cryptology – CT-RSA 2011. The cryptographers’ track at the RSA conference 2011, San Francisco, CA, USA, February 14–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19073-5/pbk). Lecture Notes in Computer Science 6558, 284-301 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Automating computational proofs for public-key-based key exchange. (English) Zbl 1286.94080

Heng, Swee-Huay (ed.) et al., Provable security. 4th international conference, ProvSec 2010, Malacca, Malaysia, October 13–15, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-16279-4/pbk). Lecture Notes in Computer Science 6402, 53-69 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Delaying mismatched field multiplications in pairing computations. (English) Zbl 1245.11126

Hasan, M. Anwar (ed.) et al., Arithmetic of finite fields. Third international workshop, WAIFI 2010, Istanbul, Turkey, June 27–30, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-13796-9/pbk). Lecture Notes in Computer Science 6087, 196-214 (2010).
MSC:  11Y16 11T71 94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Efficient certificateless KEM in the standard model. (English) Zbl 1305.94060

Lee, Donghoon (ed.) et al., Information, security and cryptology – ICISC 2009. 12th international conference, Seoul, Korea, December 2–4, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-14422-6/pbk). Lecture Notes in Computer Science 5984, 34-46 (2010).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI Link

Generic one round group key exchange in the standard model. (English) Zbl 1305.94052

Lee, Donghoon (ed.) et al., Information, security and cryptology – ICISC 2009. 12th international conference, Seoul, Korea, December 2–4, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-14422-6/pbk). Lecture Notes in Computer Science 5984, 1-15 (2010).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI Link

Avoiding full extension field arithmetic in pairing computations. (English) Zbl 1284.11160

Bernstein, Daniel J. (ed.) et al., Progress in cryptology – AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3–6, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-12677-2/pbk). Lecture Notes in Computer Science 6055, 203-224 (2010).
PDFBibTeX XMLCite
Full Text: DOI Link

Strongly secure certificateless key agreement. (English) Zbl 1248.94080

Shacham, Hovav (ed.) et al., Pairing-based cryptography – Pairing 2009. Third international conference Palo Alto, CA, USA, August 12–14, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-03297-4/pbk). Lecture Notes in Computer Science 5671, 206-230 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Faster pairings on special Weierstrass curves. (English) Zbl 1248.94062

Shacham, Hovav (ed.) et al., Pairing-based cryptography – Pairing 2009. Third international conference Palo Alto, CA, USA, August 12–14, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-03297-4/pbk). Lecture Notes in Computer Science 5671, 89-101 (2009).
MSC:  94A60 14G50
PDFBibTeX XMLCite
Full Text: DOI Link

Information security and privacy. 14th Australasian conference, ACISP 2009, Brisbane, Australia, July 1–3, 2009. Proceedings. (English) Zbl 1165.94302

Lecture Notes in Computer Science 5594. Berlin: Springer (ISBN 978-3-642-02619-5/pbk). xi, 470 p. (2009).
PDFBibTeX XMLCite
Full Text: DOI

Modeling key compromise impersonation attacks on group key exchange protocols. (English) Zbl 1227.94046

Jarecki, Stanisław (ed.) et al., Public key cryptography – PKC 2009. 12th international conference on practice and theory in public key cryptography, Irvine, CA, USA, March 18–20, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-00467-4/pbk). Lecture Notes in Computer Science 5443, 105-123 (2009).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Efficient one-round key exchange in the standard model. (English) Zbl 1279.94057

Mu, Yi (ed.) et al., Information security and privacy. 13th Australasian conference, ACISP 2008, Wollongong, Australia, July 7–9, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-69971-2/pbk). Lecture Notes in Computer Science 5107, 69-83 (2008).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI Link

Verifier-key-flexible universal designated-verifier signatures. (English) Zbl 1154.94473

Galbraith, Steven D. (ed.), Cryptography and coding. 11th IMA international conference, Cirencester, UK, December 18–20, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-77271-2/pbk). Lecture Notes in Computer Science 4887, 403-421 (2007).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

On the connection between signcryption and one-pass key establishment. (English) Zbl 1154.94389

Galbraith, Steven D. (ed.), Cryptography and coding. 11th IMA international conference, Cirencester, UK, December 18–20, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-77271-2/pbk). Lecture Notes in Computer Science 4887, 277-301 (2007).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI Link

Concrete chosen-ciphertext secure encryption from subgroup membership problems. (English) Zbl 1307.94043

Pointcheval, David (ed.) et al., Cryptology and network security. 5th international conference, CANS 2006, Suzhou, China, December 8–10, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-49462-1/pbk). Lecture Notes in Computer Science 4301, 1-18 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Efficient CCA-secure public-key encryption schemes from RSA-related assumptions. (English) Zbl 1175.94067

Barua, Rana (ed.) et al., Progress in cryptology – INDOCRYPT 2006. 7th international conference on cryptology in India, Kolkata, India, December 11-13, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-49767-7/pbk). Lecture Notes in Computer Science 4329, 176-190 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Security-mediated certificateless cryptography. (English) Zbl 1151.94496

Yung, Moti (ed.) et al., Public key cryptography – PKC 2006. 9th international conference on theory and practice of public-key cryptography, New York, NY, USA, April 24–26, 2006. Proceedings. Berlin: Springer (ISBN 3-540-33851-9/pbk). Lecture Notes in Computer Science 3958, 508-524 (2006).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Information security and privacy. 10th Australasian conference, ACISP 2005, Brisbane, Australia, July 4–6, 2005. Proceedings. (English) Zbl 1076.94001

Lecture Notes in Computer Science 3574. Berlin: Springer (ISBN 3-540-26547-3/pbk). xiii, 586 p. (2005).
PDFBibTeX XMLCite
Full Text: DOI

Tripartite key exchange in the Canetti-Krawczyk proof model. (English) Zbl 1113.94325

Canteaut, Anne (ed.) et al., Progress in cryptology – INDOCRYPT 2004. 5th international conference on cryptology in India, Chennai, India, December 20-22, 2004. Berlin: Springer (ISBN 3-540-24130-2/pbk). Lecture Notes in Computer Science 3348, 17-32 (2004).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Protocols with security proofs for mobile applications. (English) Zbl 1098.94631

Wang, Huaxiong (ed.) et al., Information security and privacy. 9th Australasian conference, ACISP 2004, Sydney, Australia, July 13–15, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22379-7/pbk). Lecture Notes in Computer Science 3108, 358-369 (2004).
MSC:  94A60 94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI

A password-based authenticator: security proof and applications. (English) Zbl 1123.94343

Johansson, Thomas (ed.) et al., Progress in cryptology – INDOCRYPT 2003. 4th international conference on cryptology in India, New Delhi, India, December 8–10, 2003. Proceedings. Berlin: Springer (ISBN 3-540-20609-4/pbk). Lect. Notes Comput. Sci. 2904, 388-401 (2003).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Provably secure mobile key exchange: Applying the Canetti-Krawczyk approach. (English) Zbl 1044.94547

Safavi-Naini, Rei (ed.) et al., Information security and privacy. 8th Australasian conference, ACISP 2003, Wollongong, Australia, July 9–11, 2003. Proceedings. Berlin: Springer (ISBN 3-540-40515-1/pbk). Lect. Notes Comput. Sci. 2727, 166-179 (2003).
MSC:  94A62 94A05 68M12
PDFBibTeX XMLCite
Full Text: Link

Round-optimal contributory conference key agreement. (English) Zbl 1033.94512

Desmedt, Yvo G. (ed.) et al., Public key cryptography – PKC 2003. 6th international workshop on practice and theory in public key cryptography, Miami, FL, USA, January 6–8, 2003. Proceedings. Berlin: Springer (ISBN 3-540-00324-X/pbk). Lect. Notes Comput. Sci. 2567, 161-174 (2002).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

A public key cryptosystem based on the subgroup membership problem. (English) Zbl 1050.94522

Qing, Sihan (ed.) et al., Information and communications security. 3rd international conference, ICICS 2001, Xian, China, November 13–16, 2001. Proceedings. Berlin: Springer (ISBN 3-540-42880-1). Lect. Notes Comput. Sci. 2229, 352-363 (2001).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: Link

Filter Results by …

Document Type

all top 5

Year of Publication

all top 3

Main Field

Software