Sciweavers

1190 search results - page 150 / 238
» Secure off-the-record messaging
Sort
View
ASIACRYPT
2007
Springer
15 years 7 months ago
Two-Party Computing with Encrypted Data
We consider a new model for online secure computation on encrypted inputs in the presence of malicious adversaries. The inputs are independent of the circuit computed in the sense ...
Seung Geol Choi, Ariel Elbaz, Ari Juels, Tal Malki...
88
Voted
CSFW
2006
IEEE
15 years 6 months ago
Resolve-Impossibility for a Contract-Signing Protocol
Abstract. A multi-party contract signing protocol allows a set of participants to exchange messages with each other with a view to arriving in a state in which each of them has a p...
Aybek Mukhamedov, Mark Dermot Ryan
105
Voted
CSFW
2005
IEEE
15 years 6 months ago
Analysis of Typed Analyses of Authentication Protocols
This paper contrasts two existing type-based techniques for the analysis of authentication protocols. The former, proposed by Gordon and Jeffrey, uses dependent types for nonces a...
Michele Bugliesi, Riccardo Focardi, Matteo Maffei
108
Voted
VMCAI
2005
Springer
15 years 6 months ago
Cryptographic Protocol Analysis on Real C Code
Abstract. Implementations of cryptographic protocols, such as OpenSSL for example, contain bugs affecting security, which cannot be detected by just analyzing abstract protocols (e...
Jean Goubault-Larrecq, Fabrice Parrennes
98
Voted
ACNS
2004
Springer
156views Cryptology» more  ACNS 2004»
15 years 6 months ago
One-Round Protocols for Two-Party Authenticated Key Exchange
Cryptographic protocol design in a two-party setting has often ignored the possibility of simultaneous message transmission by each of the two parties (i.e., using a duplex channe...
Ik Rae Jeong, Jonathan Katz, Dong Hoon Lee