Sciweavers

1190 search results - page 130 / 238
» Secure off-the-record messaging
Sort
View
109
Voted
CSFW
2007
IEEE
15 years 7 months ago
Computationally Sound Mechanized Proofs of Correspondence Assertions
We present a new mechanized prover for showing correspondence assertions for cryptographic protocols in the computational model. Correspondence assertions are useful in particular...
Bruno Blanchet
123
Voted
ACNS
2007
Springer
129views Cryptology» more  ACNS 2007»
15 years 7 months ago
Gradually Convertible Undeniable Signatures
In 1990, Boyar, Chaum, Damg˚ard and Pedersen introduced convertible undeniable signatures which limit the self-authenticating property of digital signatures but can be converted b...
Laila El Aimani, Damien Vergnaud
95
Voted
SPW
2005
Springer
15 years 6 months ago
Multi-channel Protocols
We examine several ad-hoc pairing protocols that strengthen their radio exchanges with additional transmissions over another channel, for example a screen showing graphically encod...
Ford-Long Wong
75
Voted
FSE
2003
Springer
115views Cryptology» more  FSE 2003»
15 years 6 months ago
OMAC: One-Key CBC MAC
In this paper, we present One-key CBC MAC (OMAC) and prove its security for arbitrary length messages. OMAC takes only one key, K (k bits) of a block cipher E. Previously, XCBC req...
Tetsu Iwata, Kaoru Kurosawa
111
Voted
ASIAN
2006
Springer
133views Algorithms» more  ASIAN 2006»
15 years 4 months ago
Normal Proofs in Intruder Theories
Given an arbitrary intruder deduction capability, modeled as an inference system S and a protocol, we show how to compute an inference system bS such that the security problem for ...
Vincent Bernat, Hubert Comon-Lundh