Sciweavers

905 search results - page 3 / 181
» Public key distribution through
Sort
View
PKC
2009
Springer
240views Cryptology» more  PKC 2009»
14 years 8 months ago
Distributed Public-Key Cryptography from Weak Secrets
Abstract.We introduce the notion of distributed password-based publickey cryptography, where a virtual high-entropy private key is implicitly dened as a concatenation of low-entrop...
Céline Chevalier, David Pointcheval, Michel...
NSDI
2004
13 years 8 months ago
Democratizing Content Publication with Coral
CoralCDN is a peer-to-peer content distribution network that allows a user to run a web site that offers high performance and meets huge demand, all for the price of a cheap broad...
Michael J. Freedman, Eric Freudenthal, David Mazi&...
SRDS
1993
IEEE
13 years 11 months ago
Some Remarks on Protecting Weak Keys and Poorly-Chosen Secrets from Guessing Attacks
Authentication and key distribution protocols that utilize weak secrets (such as passwords and PINs) are traditionally susceptible to guessing attacks whereby an adversary iterate...
Gene Tsudik, Els Van Herreweghen
PPL
2010
147views more  PPL 2010»
13 years 5 months ago
Key Distribution versus Key Enhancement in Quantum Cryptography
It has been said that quantum cryptography in general o ers a secure solution to the problem of key enhancement. This means that two parties who already share a small secret key, ...
Naya Nagy, Marius Nagy, Selim G. Akl