Authentication protocols

Results: 771



#Item
221Password / Challenge-response authentication / Diffie–Hellman key exchange / Public-key cryptography / Password Authenticated Key Exchange by Juggling / Zero-knowledge password proof / Cryptographic protocols / Cryptography / Password-authenticated key agreement

Password-Authenticated Multi-Party Key Exchange with Different Passwords Jeong Ok Kwon† , Ik Rae Jeong§ , Kouichi Sakurai‡ , and Dong Hoon Lee† † Center for Information Security Technologies (CIST), Korea Unive

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-12-25 07:03:53
222Password / Security / Transaction authentication number / Data / Cryptographic protocols / Computer security / Challenge-response authentication

Security Analysis of A Remote User Authentication Protocol by Liao and Wang Dang Nguyen Duc∗,a , Kwangjo Kima a Auto-ID Lab Korea, Department of Information and Communications Engineering,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-12-09 03:45:40
223Matrices / Monomial / Matrix / Conjugacy class / Inverse element / Expected value / Similar matrix / Algebra / Mathematics / Homogeneous polynomials

CRYPTANALYSIS OF MATRIX CONJUGATION SCHEMES A. D. MYASNIKOV AND A. USHAKOV Abstract. In this paper we cryptanalyze two protocols: GrigorievShpilrain authentication protocol and Wang et al. public key encryption protocols

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-10 21:50:06
224Interpolation / Polynomials / Polynomial interpolation / Polynomial / Lagrange polynomial / Time complexity / Finite field / Vandermonde matrix / Mathematics / Algebra / Theoretical computer science

Practical Affiliation-Hiding Authentication from Improved Polynomial Interpolation (Full Version? ) Mark Manulis and Bertram Poettering Cryptographic Protocols Group Department of Computer Science

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-28 06:35:09
225Data / Information / Secure communication / Internet standards / Electronic commerce / Transport Layer Security / Authentication protocol / Cipher suite / Password authentication protocol / Cryptographic protocols / Cryptography / Internet protocols

Generic Compilers for Authenticated Key Exchange∗ Tibor Jager Florian Kohlar Sven Sch¨age

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-08-02 08:15:58
226Cryptographic protocols / Cryptography / Public-key cryptography / Password authentication protocol

Attack on Two ID-based Authenticated Group Key Agreement Schemes Fangguo Zhang1 and Xiaofeng Chen2 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-12-19 03:05:28
227Security / Computing / Cryptographic protocols / Direct Anonymous Attestation / Bitcoin / Credential / Proof of knowledge / Anonymous P2P / Authentication / Cryptography / Internet privacy / Identity management

Decentralized Anonymous Credentials Christina Garman, Matthew Green, Ian Miers The Johns Hopkins University Department of Computer Science, Baltimore, USA {cgarman, mgreen, imiers}@cs.jhu.edu October 15, 2013 Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-10-15 14:07:46
228Ciphertext indistinguishability / Perfect forward secrecy / Authentication protocol / Cryptography / Cryptographic protocols / Public-key cryptography

Enhancing CK-Model for Key Compromise Impersonation Resilience and Identity-based Key Exchange Robert W. Zhu, Xiaojian Tian, and Duncan S. Wong Department of Computer Science City University of Hong Kong

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-06-13 00:19:02
229Cryptographic protocols / Computer security / Computing / Yahoo! / Electronic documents / DomainKeys Identified Mail / Author Domain Signing Practices / DomainKeys / Domain Name System / Email authentication / Spam filtering / Cryptography

Internet Engineering Task Force (IETF) Request for Comments: 6541 Category: Experimental ISSN: M. Kucherawy

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2012-02-29 13:57:51
230Digital signature / Key management / RSA / Communications protocol / Blind signature / Group signature / Cryptography / Public-key cryptography / Cryptographic protocols

Universally Composable Signature, Certification, and Authentication∗ Ran Canetti† August 15, 2004 Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-08-15 10:02:29
UPDATE