Sciweavers

345 search results - page 14 / 69
» On the Security of a Variation of Cramer-Shoup's Public Key ...
Sort
View
EUROPKI
2004
Springer
14 years 3 days ago
Flexible and Scalable Public Key Security for SSH
Abstract. A standard tool for secure remote access, the SSH protocol uses publickey cryptography to establish an encrypted and integrity-protected channel with a remote server. How...
Yasir Ali, Sean W. Smith
FC
2010
Springer
205views Cryptology» more  FC 2010»
13 years 10 months ago
On Robust Key Agreement Based on Public Key Authentication
—This paper discusses public-key authenticated key agreement protocols. First, we critically analyze several authenticated key agreement protocols and uncover various theoretical...
Feng Hao
ACISP
2005
Springer
14 years 8 days ago
Building Secure Tame-like Multivariate Public-Key Cryptosystems: The New TTS
Abstract. Multivariate public-key cryptosystems (sometimes polynomial-based PKC’s or just multivariates) handle polynomials of many variables over relatively small fields instea...
Bo-Yin Yang, Jiun-Ming Chen
ACSAC
2000
IEEE
13 years 11 months ago
A Novel Approach to On-Line Status Authentication of Public-Key Certificates
The widespread use of public networks, such as the Internet, for the exchange of sensitive data, like legally valid documents and business transactions, poses severe security cons...
Eugenio Faldella, Marco Prandini
CRYPTO
2010
Springer
157views Cryptology» more  CRYPTO 2010»
13 years 7 months ago
Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability - (or: Quadratic Residuosity Strikes Ba
The main results of this work are new public-key encryption schemes that, under the quadratic residuosity (QR) assumption (or Paillier's decisional composite residuosity (DCR...
Zvika Brakerski, Shafi Goldwasser