Sciweavers

462 search results - page 60 / 93
» Authentication of Quantum Messages
Sort
View
ACSAC
1999
IEEE
15 years 7 months ago
Fast Checking of Individual Certificate Revocation on Small Systems
High security network transactions require the checking of the revocation status of public key certificates. On mobile systems this may lead to excessive delays and unacceptable p...
Selwyn Russell
ICICS
1997
Springer
15 years 7 months ago
Stateless connections
We describe a secure transformation of stateful connections or parts of them into stateless ones by attaching the state information to the messages. Secret-key cryptography is used...
Tuomas Aura, Pekka Nikander
114
Voted
AAECC
2009
Springer
110views Algorithms» more  AAECC 2009»
15 years 7 months ago
Novel Efficient Certificateless Aggregate Signatures
We propose a new efficient certificateless aggregate signature scheme which has the advantages of both aggregate signatures and certificateless cryptography. The scheme is proven e...
Lei Zhang, Bo Qin, Qianhong Wu, Futai Zhang
DAGSTUHL
2007
15 years 4 months ago
A Collision-Resistant Rate-1 Double-Block-Length Hash Function
This paper proposes a construction for collision resistant 2n-bit hash functions, based on n-bit block ciphers with 2n-bit keys. The construction is analysed in the ideal cipher mo...
Stefan Lucks
119
Voted
CSFW
2002
IEEE
15 years 8 months ago
Types and Effects for Asymmetric Cryptographic Protocols
We present the first type and effect system for proving authenticity properties of security protocols based on asymmetric cryptography. The most significant new features of our ...
Andrew D. Gordon, Alan Jeffrey