Sciweavers

TCC
2005
Springer
139views Cryptology» more  TCC 2005»
15 years 9 months ago
The Relationship Between Password-Authenticated Key Exchange and Other Cryptographic Primitives
Abstract. We consider the problem of password-authenticated key exchange (PAK) also known as session-key generation using passwords: constructing session-key generation protocols t...
Minh-Huyen Nguyen
103
Voted
TCC
2005
Springer
101views Cryptology» more  TCC 2005»
15 years 9 months ago
Efficiently Constructible Huge Graphs That Preserve First Order Properties of Random Graphs
Moni Naor, Asaf Nussboim, Eran Tromer
136
Voted
TCC
2005
Springer
141views Cryptology» more  TCC 2005»
15 years 9 months ago
Public-Key Steganography with Active Attacks
A complexity-theoretic model for public-key steganography with active attacks is introduced. The notion of steganographic security against adaptive chosen-covertext attacks (SS-CC...
Michael Backes, Christian Cachin