Sciweavers

157 search results - page 12 / 32
» Deniable authentication and key exchange
Sort
View
IJNSEC
2008
69views more  IJNSEC 2008»
13 years 8 months ago
Proof of Forward Security for Password-based Authenticated Key Exchange
Recently, M. Abdalla et al. proposed a slightly different variant of AuthA, based on the scheme proposed by E. Bresson et al., and provided the first complete proof of forward-sec...
Shuhua Wu, Yuefei Zhu
JOC
2006
67views more  JOC 2006»
13 years 8 months ago
Threshold Password-Authenticated Key Exchange
Philip D. MacKenzie, Thomas Shrimpton, Markus Jako...
EUROCRYPT
2001
Springer
14 years 1 months ago
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
Abstract. We present a formalism for the analysis of key-exchange protocols that combines previous definitional approaches and results in a definition of security that enjoys som...
Ran Canetti, Hugo Krawczyk
COMCOM
2011
13 years 3 months ago
TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks
Key distribution in Wireless Sensor Networks (WSNs) is challenging. Symmetric cryptosystems can perform it efficiently, but they often do not provide a perfect trade-off between ...
Leonardo B. Oliveira, Diego F. Aranha, Conrado Por...
JCP
2006
120views more  JCP 2006»
13 years 8 months ago
Password-authenticated Key Exchange using Efficient MACs
Abstract-- This paper is concerned with passwordauthenticated key agreement protocols. Designing such protocols represents an interesting challenge since there is no standard way o...
Maurizio Adriano Strangio