Sciweavers

TCC
2005
Springer
139views Cryptology» more  TCC 2005»
15 years 6 months ago
The Relationship Between Password-Authenticated Key Exchange and Other Cryptographic Primitives
Abstract. We consider the problem of password-authenticated key exchange (PAK) also known as session-key generation using passwords: constructing session-key generation protocols t...
Minh-Huyen Nguyen
74
Voted
TCC
2005
Springer
101views Cryptology» more  TCC 2005»
15 years 6 months ago
Efficiently Constructible Huge Graphs That Preserve First Order Properties of Random Graphs
Moni Naor, Asaf Nussboim, Eran Tromer
TCC
2005
Springer
141views Cryptology» more  TCC 2005»
15 years 6 months ago
Public-Key Steganography with Active Attacks
A complexity-theoretic model for public-key steganography with active attacks is introduced. The notion of steganographic security against adaptive chosen-covertext attacks (SS-CC...
Michael Backes, Christian Cachin