Sciweavers

FOSSACS
2009
Springer
15 years 22 days ago
The Calculus of Handshake Configurations
Handshake protocols are asynchronous protocols that enforce several properties such as absence of transmission interference and insensitivity from delays of propagation on wires. W...
Luca Fossati, Daniele Varacca
68
Voted
ISCC
2003
IEEE
112views Communications» more  ISCC 2003»
15 years 2 months ago
Performance Evaluation of Public-Key Cryptosystem Operations in WTLS Protocol
WTLS (Wireless Transport Layer Security) is an important standard protocol for secure wireless access to Internet services. WTLS employs public-key cryptosystems during the handsh...
Albert Levi, Erkay Savas
87
Voted
ASIACRYPT
2004
Springer
15 years 2 months ago
Secret Handshakes from CA-Oblivious Encryption
Secret handshakes were recently introduced [BDS+ 03] to allow members of the same group to authenticate each other secretly, in the sense that someone who is not a group member ca...
Claude Castelluccia, Stanislaw Jarecki, Gene Tsudi...