Sciweavers

158
Voted
TCC
2005
Springer
139views Cryptology» more  TCC 2005»
15 years 10 months ago
The Relationship Between Password-Authenticated Key Exchange and Other Cryptographic Primitives
Abstract. We consider the problem of password-authenticated key exchange (PAK) also known as session-key generation using passwords: constructing session-key generation protocols t...
Minh-Huyen Nguyen
117
Voted
TCC
2005
Springer
101views Cryptology» more  TCC 2005»
15 years 10 months ago
Efficiently Constructible Huge Graphs That Preserve First Order Properties of Random Graphs
Moni Naor, Asaf Nussboim, Eran Tromer
152
Voted
TCC
2005
Springer
141views Cryptology» more  TCC 2005»
15 years 10 months ago
Public-Key Steganography with Active Attacks
A complexity-theoretic model for public-key steganography with active attacks is introduced. The notion of steganographic security against adaptive chosen-covertext attacks (SS-CC...
Michael Backes, Christian Cachin