Sciweavers

947 search results - page 55 / 190
» Provable Implementations of Security Protocols
Sort
View
ACNS
2008
Springer
132views Cryptology» more  ACNS 2008»
15 years 6 months ago
Generic Security-Amplifying Methods of Ordinary Digital Signatures
We describe two new paradigms on how to obtain ordinary signatures that are secure against existential forgery under adaptively chosen message attacks (fully-secure, in short), fro...
Jin Li, Kwangjo Kim, Fangguo Zhang, Duncan S. Wong
TCC
2007
Springer
116views Cryptology» more  TCC 2007»
15 years 6 months ago
Long-Term Security and Universal Composability
Abstract. Algorithmic progress and future technology threaten today’s cryptographic protocols. Long-term secure protocols should not even in future reveal more information to aâ€...
Jörn Müller-Quade, Dominique Unruh
CHES
2010
Springer
187views Cryptology» more  CHES 2010»
15 years 28 days ago
Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs - (Full Version)
The power of side-channel leakage attacks on cryptographic implementations is evident. Today's practical defenses are typically attack-specific countermeasures against certain...
Kimmo Järvinen, Vladimir Kolesnikov, Ahmad-Re...
ACNS
2010
Springer
200views Cryptology» more  ACNS 2010»
15 years 4 months ago
Deniable Internet Key Exchange
In this work, we develop a family of protocols for deniable Internet Key-Exchange (IKE) with the following properties: • Highly practical efficiency, and conceptual simplicity a...
Andrew Chi-Chih Yao, Yunlei Zhao
IANDC
2008
84views more  IANDC 2008»
14 years 10 months ago
Authenticating ad hoc networks by comparison of short digests
We show how to design secure authentication protocols for a non-standard class of scenarios. In these authentication is not bootstrapped from a PKI, shared secrets or trusted thir...
L. H. Nguyen, A. W. Roscoe