Sciweavers

1834 search results - page 84 / 367
» Public Key Cryptography
Sort
View
ESORICS
2007
Springer
15 years 3 months ago
Efficient Password-Based Authenticated Key Exchange Without Public Information
Jun Shao, Zhenfu Cao, Licheng Wang, Rongxing Lu
ASIAN
2006
Springer
103views Algorithms» more  ASIAN 2006»
15 years 2 months ago
Breaking and Fixing Public-Key Kerberos
Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov,...
CTRSA
2006
Springer
176views Cryptology» more  CTRSA 2006»
15 years 2 months ago
Chosen Ciphertext Secure Public Key Threshold Encryption Without Random Oracles
Abstract. We present a non-interactive chosen ciphertext secure threshold encryption system. The proof of security is set in the standard model and does not use random oracles. Our...
Dan Boneh, Xavier Boyen, Shai Halevi
ICALP
2000
Springer
15 years 2 months ago
Extended Notions of Security for Multicast Public Key Cryptosystems
Olivier Baudron, David Pointcheval, Jacques Stern