Sciweavers

1834 search results - page 127 / 367
» Public Key Cryptography
Sort
View
CCS
2009
ACM
15 years 6 months ago
Computational soundness for key exchange protocols with symmetric encryption
Formal analysis of security protocols based on symbolic models has been very successful in finding flaws in published protocols and proving protocols secure, using automated too...
Ralf Küsters, Max Tuengerthal
PAIRING
2007
Springer
148views Cryptology» more  PAIRING 2007»
15 years 5 months ago
Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys
This paper puts forward new efficient constructions for public-key broadcast encryption that simultaneously enjoy the following properties: receivers are stateless; encryption is c...
Cécile Delerablée, Pascal Paillier, ...
81
Voted
INFOCOM
2005
IEEE
15 years 4 months ago
PIKE: peer intermediaries for key establishment in sensor networks
— The establishment of shared cryptographic keys between communicating neighbor nodes in sensor networks is a challenging problem due to the unsuitability of asymmetric key crypt...
Haowen Chan, Adrian Perrig
TCC
2005
Springer
139views Cryptology» more  TCC 2005»
15 years 4 months ago
The Relationship Between Password-Authenticated Key Exchange and Other Cryptographic Primitives
Abstract. We consider the problem of password-authenticated key exchange (PAK) also known as session-key generation using passwords: constructing session-key generation protocols t...
Minh-Huyen Nguyen
TCC
2005
Springer
115views Cryptology» more  TCC 2005»
15 years 4 months ago
The Universal Composable Security of Quantum Key Distribution
The existing unconditional security definitions of quantum key distribution (QKD) do not apply to joint attacks over QKD and the subsequent use of the resulting key. In this paper...
Michael Ben-Or, Michal Horodecki, Debbie W. Leung,...