Sciweavers

107 search results - page 1 / 22
» Public-Key Cryptography and Password Protocols
Sort
View
PKC
2009
Springer
240views Cryptology» more  PKC 2009»
14 years 6 months ago
Distributed Public-Key Cryptography from Weak Secrets
Abstract.We introduce the notion of distributed password-based publickey cryptography, where a virtual high-entropy private key is implicitly dened as a concatenation of low-entrop...
Céline Chevalier, David Pointcheval, Michel...
ACNS
2005
Springer
97views Cryptology» more  ACNS 2005»
13 years 11 months ago
Thompson's Group and Public Key Cryptography
Recently, several public key exchange protocols based on symbolic computation in non-commutative (semi)groups were proposed as a more efficient alternative to well established prot...
Vladimir Shpilrain, Alexander Ushakov
AAECC
2006
Springer
132views Algorithms» more  AAECC 2006»
13 years 5 months ago
The Conjugacy Search Problem in Public Key Cryptography: Unnecessary and Insufficient
The conjugacy search problem in a group G is the problem of recovering an x G from given g G and h = x-1 gx. This problem is in the core of several recently suggested public key ...
Vladimir Shpilrain, Alexander Ushakov