Sciweavers

Share
2 search results - page 1 / 1
» Cryptanalysis of ring-LWE based key exchange with key share ...
Sort
View
IACR
2016
35views Biometrics» more  IACR 2016»
4 years 6 months ago
Cryptanalysis of ring-LWE based key exchange with key share reuse
ct This paper shows how several ring-LWE based key exchange protocols can be broken, under the assumption that the same key share is used for multiple exchanges. This indicates tha...
Scott R. Fluhrer
ACNS
2009
Springer
142views Cryptology» more  ACNS 2009»
10 years 5 months ago
Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys
We enrich the classical notion of group key exchange (GKE) protocols by a new property that allows each pair of users to derive an independent peer-to-peer (p2p) key on-demand and ...
Mark Manulis
books