Sciweavers

2472 search results - page 34 / 495
» Parallel Key Exchange
Sort
View
120
Voted
CEC
2008
IEEE
15 years 7 months ago
Fast symmetric keys generation via mutual mirroring process
—This paper presents an eavesdropper-proof algorithm that is capable of fast generating symmetric (secret) keys. Instead of literally exchanging secret keys, both the sender and ...
Chun-Shun Tseng, Ya-Yun Jheng, Sih-Yin Shen, Jung-...
98
Voted
ISORC
2006
IEEE
15 years 7 months ago
Portable Data Exchange for Remote-Testing Frameworks
To communicate between heterogeneous computer systems, mechanisms for data conversion are necessary. In this paper we present a portable, asymmetric data conversion method that is...
Raimund Kirner, Peter P. Puschner, Ingomar Wenzel,...
AAECC
2006
Springer
132views Algorithms» more  AAECC 2006»
15 years 1 months ago
The Conjugacy Search Problem in Public Key Cryptography: Unnecessary and Insufficient
The conjugacy search problem in a group G is the problem of recovering an x G from given g G and h = x-1 gx. This problem is in the core of several recently suggested public key ...
Vladimir Shpilrain, Alexander Ushakov
EUROCRYPT
2004
Springer
15 years 6 months ago
Public-Key Steganography
Informally, a public-key steganography protocol allows two parties, who have never met or exchanged a secret, to send hidden messages over a public channel so that an adversary can...
Luis von Ahn, Nicholas J. Hopper
ENTCS
2006
145views more  ENTCS 2006»
15 years 1 months ago
Real-or-random Key Secrecy of the Otway-Rees Protocol via a Symbolic Security Proof
We present the first cryptographically sound security proof of the well-known Otway-Rees protocol. More precisely, we show that the protocol is secure against arbitrary active att...
Michael Backes