Sciweavers

620 search results - page 7 / 124
» On the Leakage-Resilient Key Exchange
Sort
View
ASIACRYPT
2010
Springer
14 years 7 months ago
Lattice-Based Blind Signatures
Blind signatures (BS), introduced by Chaum, have become a cornerstone in privacy-oriented cryptography. Using hard lattice problems, such as the shortest vector problem, as the bas...
Markus Rückert
DEXAW
2005
IEEE
127views Database» more  DEXAW 2005»
15 years 3 months ago
A Key Establishment IP-Core for Ubiquitous Computing
A most critical and complex issue with regard to constrained devices in the ubiquitous and pervasive computing setting is secure key exchange. The restrictions motivate the invest...
Markus Volkmer, Sebastian Wallner
JUCS
2008
116views more  JUCS 2008»
14 years 9 months ago
Parallel Key Exchange
: In the paper we study parallel key exchange among multiple parties. The status of parallel key exchange can be depicted by a key graph. In a key graph, a vertex represents a part...
Ik Rae Jeong, Dong Hoon Lee
INFORMATICALT
2010
107views more  INFORMATICALT 2010»
14 years 6 months ago
Analysis and Improvement on a Contributory Group Key Exchange Protocol Based on the Diffie-Hellman Technique
Abstract. In 2008, based on the two-party Diffie
Yuh-Min Tseng, Tsu-Yang Wu
ESORICS
2003
Springer
15 years 2 months ago
Initiator-Resilient Universally Composable Key Exchange
Abstract. Key exchange protocols in the setting of universal composability are investigated. First we show that the ideal functionality FKE of [9] cannot be realized in the presenc...
Dennis Hofheinz, Jörn Müller-Quade, Rain...