Sciweavers

2472 search results - page 34 / 495
» Parallel Key Exchange
Sort
View
CEC
2008
IEEE
14 years 5 months ago
Fast symmetric keys generation via mutual mirroring process
—This paper presents an eavesdropper-proof algorithm that is capable of fast generating symmetric (secret) keys. Instead of literally exchanging secret keys, both the sender and ...
Chun-Shun Tseng, Ya-Yun Jheng, Sih-Yin Shen, Jung-...
ISORC
2006
IEEE
14 years 4 months ago
Portable Data Exchange for Remote-Testing Frameworks
To communicate between heterogeneous computer systems, mechanisms for data conversion are necessary. In this paper we present a portable, asymmetric data conversion method that is...
Raimund Kirner, Peter P. Puschner, Ingomar Wenzel,...
AAECC
2006
Springer
132views Algorithms» more  AAECC 2006»
13 years 10 months ago
The Conjugacy Search Problem in Public Key Cryptography: Unnecessary and Insufficient
The conjugacy search problem in a group G is the problem of recovering an x G from given g G and h = x-1 gx. This problem is in the core of several recently suggested public key ...
Vladimir Shpilrain, Alexander Ushakov
EUROCRYPT
2004
Springer
14 years 4 months ago
Public-Key Steganography
Informally, a public-key steganography protocol allows two parties, who have never met or exchanged a secret, to send hidden messages over a public channel so that an adversary can...
Luis von Ahn, Nicholas J. Hopper
ENTCS
2006
145views more  ENTCS 2006»
13 years 10 months ago
Real-or-random Key Secrecy of the Otway-Rees Protocol via a Symbolic Security Proof
We present the first cryptographically sound security proof of the well-known Otway-Rees protocol. More precisely, we show that the protocol is secure against arbitrary active att...
Michael Backes