Sciweavers

438 search results - page 1 / 88
» Design and Analysis of Password-Based Key Derivation Functio...
Sort
View
CTRSA
2005
Springer
91views Cryptology» more  CTRSA 2005»
14 years 4 months ago
Design and Analysis of Password-Based Key Derivation Functions
Frances F. Yao, Yiqun Lisa Yin
EUROCRYPT
2003
Springer
14 years 4 months ago
A Framework for Password-Based Authenticated Key Exchange
Abstract. In this paper we present a general framework for passwordbased authenticated key exchange protocols, in the common reference odel. Our protocol is actually an abstraction...
Rosario Gennaro, Yehuda Lindell
IJNSEC
2011
145views more  IJNSEC 2011»
13 years 5 months ago
Symmetric Key Image Encryption Scheme with Key Sequences Derived from Random Sequence of Cyclic Elliptic Curve Points
In this paper, cyclic elliptic curves of the form y2 + xy = x3 + ax2 + b, a, b ∈ GF(2m ) with order M is considered in the design of a Symmetric Key Image Encryption Scheme with...
S. V. Sathyanarayana, M. Aswatha Kumar, K. N. Hari...
CTRSA
2011
Springer
189views Cryptology» more  CTRSA 2011»
13 years 2 months ago
Ideal Key Derivation and Encryption in Simulation-Based Security
Abstract. Many real-world protocols, such as SSL/TLS, SSH, IPsec, IEEE 802.11i, DNSSEC, and Kerberos, derive new keys from other keys. To be able to analyze such protocols in a com...
Ralf Küsters, Max Tuengerthal
SIAMJO
2010
74views more  SIAMJO 2010»
13 years 5 months ago
Various Lipschitz-like Properties for Functions and Sets I: Directional Derivative and Tangential Characterizations
In this work we introduce for extended real valued functions, defined on a Banach space X, the concept of K directionally Lipschitzian behavior, where K is a bounded subset of X. F...
Rafael Correa, Pedro Gajardo, Lionel Thibault