Sciweavers

11 search results - page 1 / 3
» Practical Proven Secure Authentication with Arbitration
Sort
View
ASIACRYPT
1992
Springer
13 years 9 months ago
Practical Proven Secure Authentication with Arbitration
Yvo Desmedt, Jennifer Seberry
IMA
1997
Springer
211views Cryptology» more  IMA 1997»
13 years 9 months ago
Key Agreement Protocols and Their Security Analysis
This paper proposes new protocols for two goals: authenticated key agreement and authenticated key agreement with key con rmation in the asymmetric public-key setting. A formalm...
Simon Blake-Wilson, Don Johnson, Alfred Menezes
ASIACRYPT
2000
Springer
13 years 9 months ago
Password-Authenticated Key Exchange Based on RSA
Abstract. There have been many proposals in recent years for passwordauthenticated key exchange protocols. Many of these have been shown to be insecure, and the only ones that seem...
Philip D. MacKenzie, Sarvar Patel, Ram Swaminathan
CRYPTO
1999
Springer
159views Cryptology» more  CRYPTO 1999»
13 years 9 months ago
UMAC: Fast and Secure Message Authentication
We describe a message authentication algorithm, UMAC, which can authenticate messages (in software, on contemporary machines) roughly an order of magnitude faster than current prac...
John Black, Shai Halevi, Hugo Krawczyk, Ted Krovet...
COMCOM
2007
83views more  COMCOM 2007»
13 years 5 months ago
Improving authentication of remote card transactions with mobile personal trusted devices
Credit card transactions are a popular and diffused means of payment over the network. Unfortunately, current technology does not allow us to technically solve disputes that may ...
Andrea Bottoni, Gianluca Dini