Sciweavers

620 search results - page 43 / 124
» On the Leakage-Resilient Key Exchange
Sort
View
FC
2004
Springer
94views Cryptology» more  FC 2004»
15 years 3 months ago
The Ephemeral Pairing Problem
Abstract In wireless ad-hoc broadcast networks the pairing problem consists of establishing a (long-term) connection between two specific physical nodes in the network that do not...
Jaap-Henk Hoepman
FPL
1998
Springer
107views Hardware» more  FPL 1998»
15 years 2 months ago
Modular Exponent Realization on FPGAs
The article describes modular exponent calculations used widely in cryptographic key exchange protocols. The measures for hardware consumption and execution speed based on argument...
Juri Põldre, Kalle Tammemäe, Marek Man...
CORR
2010
Springer
83views Education» more  CORR 2010»
14 years 9 months ago
A Platform for Implementing Secure Wireless Ad Hoc Networks
: We propose a new platform for implementing secure wireless ad hoc networks. Our proposal is based on a modular architecture, with the software stack constructed directly on the E...
Gyula Farkas, Béla Genge, Piroska Haller
ESORICS
1998
Springer
15 years 2 months ago
Authentication and Payment in Future Mobile Systems
Abstract. This article presents an efficient public-key protocol for mutual authentication and key exchange designed for third generation mobile communications systems. The paper a...
Günther Horn, Bart Preneel
SEC
2001
14 years 11 months ago
Security Analysis of the Cliques Protocols Suites: First Results
: The Cliques protocols are extensions of the Diffie-Hellman key exchange protocol to a group setting. In this paper, we are analysing the A-GDH.2 suite that is intended to allow a...
Olivier Pereira, Jean-Jacques Quisquater