Sciweavers

IMA
1997
Springer
88views Cryptology» more  IMA 1997»
14 years 4 months ago
Increasing Efficiency of International Key Escrow in Mutually Mistrusting Domains
This paper is concerned with key escrow protocols for use in international communications environments, where communication domains do not necessarily trust one another. It is conc...
Keith M. Martin
IMA
1997
Springer
106views Cryptology» more  IMA 1997»
14 years 4 months ago
Hash Functions and MAC Algorithms Based on Block Ciphers
This paper reviews constructions of hash functions and MAC algorithms based on block ciphers. It discusses the main requirements for these cryptographic primitives, motivates these...
Bart Preneel
IMA
1997
Springer
105views Cryptology» more  IMA 1997»
14 years 4 months ago
Split Knowledge Generation of RSA Parameters
We show how it is possible for two parties to co-operate in generating the parameters for an RSA encryption system in such a way that neither individually has the ability to decry...
Clifford Cocks
IMA
1997
Springer
211views Cryptology» more  IMA 1997»
14 years 4 months ago
Key Agreement Protocols and Their Security Analysis
This paper proposes new protocols for two goals: authenticated key agreement and authenticated key agreement with key con rmation in the asymmetric public-key setting. A formalm...
Simon Blake-Wilson, Don Johnson, Alfred Menezes