×

Found 20 Documents (Results 1–20)

Quantum key distribution in the classical authenticated key exchange framework. (English) Zbl 1306.94105

Gaborit, Philippe (ed.), Post-quantum cryptography. 5th international workshop, PQCrypto 2013, Limoges, France, June 4–7, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38615-2/pbk). Lecture Notes in Computer Science 7932, 136-154 (2013).
MSC:  94A62 81P94 94A60
PDFBibTeX XMLCite
Full Text: DOI arXiv Link

Sufficient condition for ephemeral key-leakage resilient tripartite key exchange. (English) Zbl 1305.94047

Susilo, Willy (ed.) et al., Information security and privacy. 17th Australasian conference, ACISP 2012, Wollongong, NSW, Australia, July 9–11, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-31447-6/pbk). Lecture Notes in Computer Science 7372, 15-28 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

A generic variant of NIST’S KAS2 key agreement protocol. (English) Zbl 1279.94062

Parampalli, Udaya (ed.) et al., Information security and privacy. 16th Australasian conference, ACISP 2011, Melbourne, Australia, July 11–13, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22496-6/pbk). Lecture Notes in Computer Science 6812, 353-370 (2011).
MSC:  94A60 94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI

Combined security analysis of the one- and three-pass unified model key agreement protocols. (English) Zbl 1253.94043

Gong, Guang (ed.) et al., Progress in cryptology – INDOCRYPT 2010. 11th international conference on cryptology in India, Hyderabad, India, December 12–15, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17400-1/pbk). Lecture Notes in Computer Science 6498, 49-68 (2010).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Ephemeral key leakage resilient and efficient ID-AKEs that can share identities, private and master keys. (English) Zbl 1252.94063

Joye, Marc (ed.) et al., Pairing-based cryptography – Pairing 2010. 4th international conference, Yamanaka Hot Spring, Japan, December 13–15, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17454-4/pbk). Lecture Notes in Computer Science 6487, 187-205 (2010).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Modeling leakage of ephemeral secrets in tripartite/group key exchange. (English) Zbl 1305.94063

Lee, Donghoon (ed.) et al., Information, security and cryptology – ICISC 2009. 12th international conference, Seoul, Korea, December 2–4, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-14422-6/pbk). Lecture Notes in Computer Science 5984, 16-33 (2010).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI Link

Reusing static keys in key agreement protocols. (English) Zbl 1252.94054

Roy, Bimal (ed.) et al., Progress in cryptology – INDOCRYPT 2009. 10th international conference on cryptology in India, New Delhi, India, December 13–16, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-10627-9/pbk). Lecture Notes in Computer Science 5922, 39-56 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman protocols. (English) Zbl 1267.94133

Pieprzyk, Josef (ed.) et al., Provable security. Third international conference, ProvSec 2009, Guangzhou, China, November 11–13, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-04641-4/pbk). Lecture Notes in Computer Science 5848, 183-197 (2009).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Towards denial-of-service-resilient key agreement protocols. (English) Zbl 1284.94114

Boyd, Colin (ed.) et al., Information security and privacy. 14th Australasian conference, ACISP 2009, Brisbane, Australia, July 1–3, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-02619-5/pbk). Lecture Notes in Computer Science 5594, 389-406 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Comparing the pre- and post-specified peer models for key agreement. (English) Zbl 1279.94102

Mu, Yi (ed.) et al., Information security and privacy. 13th Australasian conference, ACISP 2008, Wollongong, Australia, July 7–9, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-69971-2/pbk). Lecture Notes in Computer Science 5107, 53-68 (2008).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI Link

On the importance of public-key validation in the MQV and HMQV key agreement protocols. (English) Zbl 1175.94092

Barua, Rana (ed.) et al., Progress in cryptology – INDOCRYPT 2006. 7th international conference on cryptology in India, Kolkata, India, December 11-13, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-49767-7/pbk). Lecture Notes in Computer Science 4329, 133-147 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Filter Results by …

Document Type

all top 5

Year of Publication

all top 3

Main Field

Software