Sciweavers

255 search results - page 3 / 51
» Principles for Entity Authentication
Sort
View
PKC
2005
Springer
144views Cryptology» more  PKC 2005»
13 years 11 months ago
RSA with Balanced Short Exponents and Its Application to Entity Authentication
In typical RSA, it is impossible to create a key pair (e, d) such that both are simultaneously much shorter than φ(N). This is because if d is selected first, then e will be of t...
Hung-Min Sun, Cheng-Ta Yang
CRYPTO
1993
Springer
104views Cryptology» more  CRYPTO 1993»
13 years 9 months ago
Entity Authentication and Key Distribution
Mihir Bellare, Phillip Rogaway
HICSS
2010
IEEE
157views Biometrics» more  HICSS 2010»
14 years 18 days ago
Design Principles for Power Grid Cyber-Infrastructure Authentication Protocols
Recently, there has been an increased focus and a sense of urgency in developing standards for Power Grid systems centered on the need for interoperability. Given the threat again...
Himanshu Khurana, Rakeshbabu Bobba, Timothy M. Yar...
ASIACRYPT
2010
Springer
13 years 3 months ago
Generic Compilers for Authenticated Key Exchange
So far, all solutions proposed for authenticated key agreement combine key agreement and authentication into a single cryptographic protocol. However, in many important applicatio...
Tibor Jager, Florian Kohlar, Sven Schäge, J&o...
PERCOM
2006
ACM
14 years 5 months ago
The Master Key: A Private Authentication Approach for Pervasive Computing Environments
We propose a novel entity authentication approach for pervasive computing environments. A person uses a single device, the Master Key, which aggregates all his digital forms of ac...
Feng Zhu, Matt W. Mutka, Lionel M. Ni