Sciweavers

164 search results - page 2 / 33
» Password-Based Encryption Analyzed
Sort
View
EUC
2008
Springer
13 years 7 months ago
An Improved Password-Based Authenticated Key Agreement Scheme for Pervasive Applications
Password authentication is a popular approach used for user authentication in pervasive computing environments due to its simplicity and convenience. To secure the transmission be...
Maw-Jinn Tsaur, Wei-Chi Ku, Hao-Rung Chung
JCP
2007
122views more  JCP 2007»
13 years 5 months ago
Converting Group Key Agreement Protocol into Password-Based Setting - Case Study
Abstract— Converting a secure group key agreement protocol into password-based setting is not a trivial task. The security of a password-based scheme hinges on preventing diction...
Ratna Dutta
IACR
2011
149views more  IACR 2011»
12 years 4 months ago
Public Key Encryption for the Forgetful
We investigate public key encryption that allows the originator of a ciphertext to retrieve a “forgotten” plaintext from the ciphertext. This type of public key encryption wit...
Puwen Wei, Yuliang Zheng, Xiaoyun Wang
IEEEMSP
2002
IEEE
121views Multimedia» more  IEEEMSP 2002»
13 years 10 months ago
Communication-friendly encryption of multimedia
Abstract— This paper discusses encryption operations that selectively encrypt content-carrying segments of multimedia data stream. We propose and analyze three techniques that wo...
Min Wu, Yinian Mao
CTRSA
2012
Springer
273views Cryptology» more  CTRSA 2012»
12 years 28 days ago
On the Joint Security of Encryption and Signature in EMV
We provide an analysis of current and future algorithms for signature and encryption in the EMV standards in the case where a single key-pair is used for both signature and encrypt...
Jean Paul Degabriele, Anja Lehmann, Kenneth G. Pat...