×

Found 64 Documents (Results 1–64)

SoK: how (not) to design and implement post-quantum cryptography. (English) Zbl 1479.94189

Paterson, Kenneth G. (ed.), Topics in cryptology – CT-RSA 2021. Cryptographers’ track at the RSA conference 2021, virtual event, May 17–20, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12704, 444-477 (2021).
MSC:  94A60 94A62 81P94
PDFBibTeX XMLCite
Full Text: DOI

Provably secure key establishment against quantum adversaries. (English) Zbl 1427.81024

Wilde, Mark M. (ed.), 12th conference on the theory of quantum computation, communication and cryptography, TQC 2017, June 14–16, 2017, Paris, France. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 73, Article 3, 17 p. (2018).
MSC:  81P94 94A60
PDFBibTeX XMLCite
Full Text: DOI arXiv

Non-associative key establishment protocols and their implementation. (English) Zbl 1380.94104

Kahrobaei, Delaram (ed.) et al., Algebra and computer science. Joint AMS-EMS-SPM meeting algebra and computer science, Porto, Portugal, June 10–13, 2015. Joint mathematics meetings groups, algorithms, and cryptography, San Antonio, TX, USA, January 10–13, 2015. Joint AMS-Israel Mathematical Union meeting applications of algebra to cryptography, Tel-Aviv, Israel, June 16–19, 2014. Proceedings. Providence, RI: American Mathematical Society (AMS) (ISBN 978-1-4704-2303-2/pbk; 978-1-4704-3587-5/ebook). Contemporary Mathematics 677, 113-128 (2016).
MSC:  94A60 20N02
PDFBibTeX XMLCite
Full Text: DOI arXiv

Non-associative public-key cryptography. (English) Zbl 1380.94103

Kahrobaei, Delaram (ed.) et al., Algebra and computer science. Joint AMS-EMS-SPM meeting algebra and computer science, Porto, Portugal, June 10–13, 2015. Joint mathematics meetings groups, algorithms, and cryptography, San Antonio, TX, USA, January 10–13, 2015. Joint AMS-Israel Mathematical Union meeting applications of algebra to cryptography, Tel-Aviv, Israel, June 16–19, 2014. Proceedings. Providence, RI: American Mathematical Society (AMS) (ISBN 978-1-4704-2303-2/pbk; 978-1-4704-3587-5/ebook). Contemporary Mathematics 677, 85-112 (2016).
MSC:  94A60 20N02
PDFBibTeX XMLCite
Full Text: DOI arXiv

Key chain-based key predistribution protocols for securing wireless sensor networks. (English) Zbl 1323.94152

Mohapatra, Ram N. (ed.) et al., Mathematics and computing. Selected papers based on the presentations at the 2nd international conference, ICMC, Haldia, India, January 5–10, 2015. New Delhi: Springer (ISBN 978-81-322-2451-8/hbk; 978-81-322-2452-5/ebook). Springer Proceedings in Mathematics & Statistics 139, 135-154 (2015).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Preventing scaling of successful attacks: a cross-layer security architecture for resource-constrained platforms. (English) Zbl 1401.94181

Ors, Berna (ed.) et al., Cryptography and information security in the Balkans. First international conference, BalkanCryptSec 2014, Istanbul, Turkey, October 16–17, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-21355-2/pbk; 978-3-319-21356-9/ebook). Lecture Notes in Computer Science 9024, 103-120 (2015).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Scalable deniable group key establishment. (English) Zbl 1326.94129

Garcia-Alfaro, Joaquin (ed.) et al., Foundations and practice of security. 5th international symposium, FPS 2012, Montreal, QC, Canada, October 25–26, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-37118-9/pbk). Lecture Notes in Computer Science 7743, 365-373 (2013).
MSC:  94A62 68P25 68M12
PDFBibTeX XMLCite
Full Text: DOI

A complementary analysis of the (s)YZ and DIKE protocols. (English) Zbl 1304.94107

Mitrokotsa, Aikaterini (ed.) et al., Progress in cryptology – AFRICACRYPT 2012. 5th international conference on cryptology in Africa, Ifrane, Morocco, July 10–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-31409-4/pbk). Lecture Notes in Computer Science 7374, 203-220 (2012).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Communication-efficient 2-round group key establishment from pairings. (English) Zbl 1284.94143

Kiayias, Aggelos (ed.), Topics in cryptology – CT-RSA 2011. The cryptographers’ track at the RSA conference 2011, San Francisco, CA, USA, February 14–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19073-5/pbk). Lecture Notes in Computer Science 6558, 65-76 (2011).
MSC:  94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI

Provably secure password-authenticated group key exchange with different passwords under standard assumption. (English) Zbl 1281.94091

Bao, Feng (ed.) et al., Information security and cryptology. 5th international conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-16341-8/pbk). Lecture Notes in Computer Science 6151, 124-133 (2010).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Understanding cryptography. A textbook for students and practitioners. Foreword by Bart Preneel. (English) Zbl 1190.94029

Berlin: Springer (ISBN 978-3-642-04100-6/hbk; 978-3-642-04101-3/ebook). xviii, 372 p. (2010).
MSC:  94A60 68P25 94-01
PDFBibTeX XMLCite
Full Text: DOI

A clustering-based group key agreement protocol for ad-hoc networks. (English) Zbl 1277.94054

Di Crescenzo, Giovanni (ed.) et al., Proceedings of the third workshop on cryptography for ad-hoc networks (WCAN 2007), Wrocław, Poland, July 8, 2007. Amsterdam: Elsevier. Electronic Notes in Theoretical Computer Science 192, No. 2, 43-53 (2008).
MSC:  94A62 68M12
PDFBibTeX XMLCite
Full Text: DOI

A cluster-based Key establishment protocol for wireless mobile ad hoc networks. (English) Zbl 1183.68065

Sarbazi-Azad, Hamid (ed.) et al., Advances in computer science and engineering. 13th international CSI computer conference, CSICC 2008, Kish Island, Iran, March 9–11, 2008. Revised selected papers. Berlin: Springer (ISBN 978-3-540-89984-6/pbk; 978-3-540-89985-3/ebook). Communications in Computer and Information Science 6, 585-592 (2008).
MSC:  68M10
PDFBibTeX XMLCite
Full Text: DOI

Design, analysis and performance evaluation of group key establishment in wireless sensor networks. (English) Zbl 1277.68030

Di Crescenzo, Giovanni (ed.) et al., Proceedings of the second workshop on cryptography for ad-hoc networks (WCAN 2006), Venice, Italy, July 16, 2006. Amsterdam: Elsevier. Electronic Notes in Theoretical Computer Science 171, No. 1, 17-31 (2007).
MSC:  68M12 94A62 68W15
PDFBibTeX XMLCite
Full Text: DOI

Security of a leakage-resilient protocol for key establishment and mutual authentication. (Extended abstract). (English) Zbl 1138.94384

Susilo, Willy (ed.) et al., Provable security. First international conference, ProvSec 2007, Wollongong, Australia, November 1–2, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-75669-9/pbk). Lecture Notes in Computer Science 4784, 169-177 (2007).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

On the connection between signcryption and one-pass key establishment. (English) Zbl 1154.94389

Galbraith, Steven D. (ed.), Cryptography and coding. 11th IMA international conference, Cirencester, UK, December 18–20, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-77271-2/pbk). Lecture Notes in Computer Science 4887, 277-301 (2007).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI Link

The combinatorics of cryptographic key establishment. (English) Zbl 1150.94010

Hilton, Anthony (ed.) et al., Surveys in combinatorics 2007. Papers from the 21st British combinatorial conference, Reading, UK, July 8–13, 2007. Cambridge: Cambridge University Press (ISBN 978-0-521-69823-8/pbk). London Mathematical Society Lecture Note Series 346, 223-273 (2007).
PDFBibTeX XMLCite

(Password) authenticated key establishment: from 2-party to group. (English) Zbl 1129.94040

Vadhan, Salil P. (ed.), Theory of cryptography. 4th theory of cryptography conference, TCC 2007, Amsterdam, The Netherlands, February 21–24, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-70935-0/pbk). Lecture Notes in Computer Science 4392, 499-514 (2007).
MSC:  94A62 94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Towards provably secure group key agreement building on group theory. (English) Zbl 1295.94025

Nguyen, Phong Q. (ed.), Progress in cryptology – VIETCRYPT 2006. First international conference on cryptology in Vietnam, Hanoi, Vietnam, September 25–28, 2006. Revised selected papers. Berlin: Springer (ISBN 978-3-540-68799-3/pbk). Lecture Notes in Computer Science 4341, 322-336 (2006).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Dynamic policy discovery with remote attestation. (Extended abstract). (English) Zbl 1180.68066

Aceto, Luca (ed.) et al., Foundations of software science and computation structures. 9th international conference, FOSSACS 2006, held as part of the joint European conferences on theory and practice of software, ETAPS 2006, Vienna, Austria, March 25–31, 2006. Proceedings. Berlin: Springer (ISBN 3-540-33045-3/pbk). Lecture Notes in Computer Science 3921, 111-125 (2006).
MSC:  68M14 68Q85
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of two user identification schemes with key distribution preserving anonymity. (English) Zbl 1122.94408

Qing, Sihan (ed.) et al., Information and communications security. 7th international conference, ICICS 2005, Beijing, China, December 10–13, 2005. Proceedings. Berlin: Springer (ISBN 3-540-30934-9/pbk). Lecture Notes in Computer Science 3783, 315-322 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Forward secrecy and its application to future mobile communications security. (English) Zbl 0969.94020

Imai, Hideki (ed.) et al., Public key cryptography. 3rd international workshop on Practice and theory in public key cryptosystems, PKC 2000, Melbourne, Victoria, Australia, January 18-20, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1751, 433-445 (2000).
MSC:  94A60 68P25
PDFBibTeX XMLCite

Unknown key-share attacks on the station-to-station (STS) protocol. (English) Zbl 0929.68056

Imai, Hideki (ed.) et al., Public key cryptography. 2nd international workshop on Practice and theory in public key cryptography, PKC ’99. Kamakura, Japan, March 1–3, 1999. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1560, 154-170 (1999).
MSC:  68P25 94A62 94A60
PDFBibTeX XMLCite

Authenticated Diffie-Hellman key agreement protocols. (English) Zbl 0929.68057

Tavares, Stafford (ed.) et al., Selected areas in cryptography. 5th annual international workshop, SAC ’98. Kingston, Ontario, Canada, August 17–18, 1998. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1556, 339-361 (1999).
MSC:  68P25 94A62
PDFBibTeX XMLCite

Key establishment protocols for secure mobile communications: A selective survey. (English) Zbl 0931.94052

Boyd, Colin (ed.) et al., Information security and privacy. 3rd Australasian conference, ACISP ’98, Brisbane, Australia, July 13–15, 1998. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1438, 344-355 (1998).
MSC:  94A62 68P25
PDFBibTeX XMLCite

Filter Results by …

Document Type

all top 5

Author

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software