Sciweavers

1116 search results - page 41 / 224
» Key Agreement Using Statically Keyed Authenticators
Sort
View
COMPSAC
2010
IEEE
13 years 5 months ago
Key Roles of Session State: Not against REST Architectural Style
The modern Web architecture basically follows the Representational State Transfer (REST) style. This style offers the architectural properties necessary to implement the Internetsc...
Takeru Inoue, Hiroshi Asakura, Hiroshi Sato, Noriy...
CRYPTO
2000
Springer
151views Cryptology» more  CRYPTO 2000»
14 years 2 days ago
New Public-Key Cryptosystem Using Braid Groups
Abstract. The braid groups are infinite non-commutative groups naturally arising from geometric braids. The aim of this article is twofold. One is to show that the braid groups ca...
Ki Hyoung Ko, Sangjin Lee, Jung Hee Cheon, Jae Woo...
ASIACRYPT
2000
Springer
14 years 2 days ago
Increasing the Lifetime of a Key: A Comparative Analysis of the Security of Re-keying Techniques
Rather than use a shared key directly to cryptographically process (e.g. encrypt or authenticate) data one can use it as a master key to derive subkeys, and use the subkeys for the...
Michel Abdalla, Mihir Bellare
ACNS
2006
Springer
121views Cryptology» more  ACNS 2006»
14 years 1 months ago
Authentication for Paranoids: Multi-party Secret Handshakes
In a society increasingly concerned with the steady assault on electronic privacy, the need for privacy-preserving techniques is both natural and justified. This need extends to t...
Stanislaw Jarecki, Jihye Kim, Gene Tsudik
NDSS
1999
IEEE
14 years 3 hour ago
Addressing the Problem of Undetected Signature Key Compromise
Suppose that messages have been signed using a user's signature private key during the period of time after a key compromise but before the compromise is detected. This is a ...
Mike Just, Paul C. van Oorschot