128
click to vote
ACNS
15 years 6 months ago
2008 Springer
We present generic constructions of stateful public key encryption (StPE). We build several new StPE schemes and explain existing ones using our generic constructions. Of the new ...
123
Voted
ACNS
15 years 6 months ago
2008 Springer
Abstract. One of the main challenges in RFIDs is the design of privacypreserving authentication protocols. Indeed, such protocols should not only allow legitimate readers to authen...
107
Voted
ACNS
15 years 6 months ago
2008 Springer
Abstract. In order to increase the security for authenticated key exchange protocols, various authentication means can be used together. In this paper, we introduce a security mode...
95
Voted
ACNS
15 years 6 months ago
2008 Springer
In this paper, we present an analysis of the CCM mode of operations and of a slight variant. CCM is a simple and efficient encryption scheme which combines a CBC-MAC authentication...
96
Voted
ACNS
15 years 6 months ago
2008 Springer
Abstract. Very recently, the concept of Traceable Identity-based Encryption (IBE) scheme (or Accountable Authority Identity based Encryption scheme) was introduced in Crypto 2007. ...
|