Sciweavers

1825 search results - page 20 / 365
» Cryptographic Securities Exchanges
Sort
View
122
Voted
LPAR
2005
Springer
15 years 8 months ago
Algebraic Intruder Deductions
Abstract. Many security protocols fundamentally depend on the algebraic properties of cryptographic operators. It is however difficult to handle these properties when formally anal...
David A. Basin, Sebastian Mödersheim, Luca Vi...
66
Voted
DCC
2004
IEEE
16 years 2 months ago
Iris Compression for Cryptographically Secure Person Identification
Daniel Schonberg, Darko Kirovski
115
Voted
CRYPTO
2000
Springer
89views Cryptology» more  CRYPTO 2000»
15 years 6 months ago
On the Round Security of Symmetric-Key Cryptographic Primitives
We put forward a new model for understanding the security of symmetric-key primitives, such as block ciphers. The model captures the fact that many such primitives often consist of...
Zulfikar Ramzan, Leonid Reyzin
118
Voted
ACSW
2006
15 years 4 months ago
Logcrypt: forward security and public verification for secure audit logs
Logcrypt provides strong cryptographic assurances that data stored by a logging facility before a system compromise cannot be modified after the compromise without detection. We b...
Jason E. Holt
123
Voted
ACISP
2008
Springer
15 years 4 months ago
Efficient One-Round Key Exchange in the Standard Model
We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of...
Colin Boyd, Yvonne Cliff, Juan Manuel Gonzá...