Sciweavers

281 search results - page 35 / 57
» Scalable Protocols for Authenticated Group Key Exchange
Sort
View
WS
2004
ACM
15 years 9 months ago
Analysis of the 802.11i 4-way handshake
802.11i is an IEEE standard designed to provide enhanced MAC security in wireless networks. The authentication process involves three entities: the supplicant (wireless device), t...
Changhua He, John C. Mitchell
SP
1997
IEEE
139views Security Privacy» more  SP 1997»
15 years 7 months ago
Number Theoretic Attacks on Secure Password Schemes
Encrypted Key Exchange (EKE) [1, 2] allows two parties sharing a password to exchange authenticated information over an insecure network by using a combination of public and secre...
Sarvar Patel
141
Voted
NDSS
1998
IEEE
15 years 8 months ago
The Secure Remote Password Protocol
This paper presents a new password authentication and key-exchange protocol suitable for authenticating users and exchanging keys over an untrusted network. The new protocol resis...
Thomas D. Wu
DAM
2006
97views more  DAM 2006»
15 years 4 months ago
Entity authentication schemes using braid word reduction
Abstract. Artin's braid groups currently provide a promising background for cryptographical applications, since the first cryptosystems using braids were introduced in [2, 3, ...
Hervé Sibert, Patrick Dehornoy, Marc Giraul...
CISC
2007
Springer
156views Cryptology» more  CISC 2007»
15 years 10 months ago
Deniable Authentication on the Internet
Deniable authentication is a technique that allows one party to send messages to another while the latter can not prove to a third party the fact of communication. In this paper, w...
Shaoquan Jiang