Sciweavers

331 search results - page 44 / 67
» Provably Secure Timed-Release Public Key Encryption
Sort
View
FSTTCS
2007
Springer
14 years 1 months ago
Safely Composing Security Protocols
Security protocols are small programs that are executed in hostile environments. Many results and tools have been developed to formally analyze the security of a protocol. However ...
Véronique Cortier, Jérémie De...
CSREASAM
2006
13 years 9 months ago
Cryptcoding - Encryption and Error-Correction Coding in a Single Step
In this paper we re-open a 25 years old question of joint encryption and error-correction coding, named here as Cryptcoding. Cryptcoding is a procedure in which encryption/decrypti...
Danilo Gligoroski, Svein J. Knapskog, Suzana Andov...
ACSAC
2008
IEEE
14 years 2 months ago
A Survey to Guide Group Key Protocol Development
A large number of papers have proposed cryptographic protocols for establishing secure group communication. These protocols allow group members to exchange or establish keys to en...
Ahren Studer, Christina Johns, Jaanus Kase, Kyle O...
CCS
2001
ACM
14 years 1 days ago
The performance of public key-enabled kerberos authentication in mobile computing applications
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
Alan Harbitter, Daniel A. Menascé
ACNS
2007
Springer
165views Cryptology» more  ACNS 2007»
14 years 1 months ago
Tweaking TBE/IBE to PKE Transforms with Chameleon Hash Functions
We present two transforms to acquire chosen ciphertext security from tag based techniques. The first one requires the separability of underlying primitives. By separability, info...
Rui Zhang 0002