Sciweavers

2303 search results - page 10 / 461
» The Cryptographic Abstract Machine
Sort
View
CTRSA
2008
Springer
130views Cryptology» more  CTRSA 2008»
13 years 9 months ago
Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework
ended abstract appeared in Proceedings of the Cryptographers' Track at the RSA Conference (CT-RSA '08)
Michel Abdalla, Dario Catalano, Céline Chev...
ACSAC
1999
IEEE
13 years 11 months ago
Adding Availability to Log Services of Untrusted Machines
Uncorrupted log files are the critical system component for computer forensics in case of intrusion and for real time system monitoring and auditing. Protection from tampering wit...
Arianna Arona, Danilo Bruschi, Emilia Rosti
LATINCRYPT
2010
13 years 5 months ago
New Software Speed Records for Cryptographic Pairings
Abstract. This paper presents new software speed records for the computation of cryptographic pairings. More specifically, we present details of an implementation which computes t...
Michael Naehrig, Ruben Niederhagen, Peter Schwabe
DRMTICS
2005
Springer
14 years 28 days ago
A Vector Approach to Cryptography Implementation
The current deployment of Digital Right Management (DRM) schemes to distribute protected contents and rights is leading the way to massive use of sophisticated embedded cryptograph...
Jacques J. A. Fournier, Simon W. Moore
ESORICS
2006
Springer
13 years 11 months ago
Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos
Abstract We present a computational analysis of basic Kerberos with and without its public-key extension PKINIT in which we consider authentication and key secrecy properties. Our ...
Michael Backes, Iliano Cervesato, Aaron D. Jaggard...