Cryptographic protocol

Results: 1374



#Item
421Cryptographic protocols / Cryptographic software / Internet protocols / Password / Security token / S/KEY / One-time password / Key-agreement protocol / Salt / Security / Computer security / Cryptography

Prompted User Retrieval of Secret Entropy: The Passmaze Protocol Daniel R. L. Brown∗ December 15, 2005 Abstract A prompting protocol permits users to securely retrieve secrets with greater entropy than

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-12-23 10:31:13
422Diffie–Hellman key exchange / Key-agreement protocol / Advantage / Diffie–Hellman problem / Cryptographic nonce / Adversary model / SPEKE / Secure Remote Password protocol / Cryptography / Cryptographic protocols / Random oracle

A preliminary version appears in ISC 2009, Lecture Notes in Computer Science, Springer-Verlag, 2009. This version is dated December 18, 2009. Security Analysis of the PACE Key-Agreement Protocol Jens Bender1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-12-18 06:37:52
423Information / Cryptography / Secure multi-party computation / Key management / Communications protocol / Lookup table / Homomorphic encryption / Secret sharing / Transmission Control Protocol / Cryptographic protocols / Data / Computing

Combining Secret Sharing and Garbled Circuits for Efficient Private IEEE 754 Floating-Point Computations Pille Pullonen1,2 and Sander Siim1,2 1 Cybernetica AS

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-10 10:34:14
424Cryptographic protocols / Trapdoor function / Claw-free permutation / One-way function / Zero-knowledge proof / XTR / Mercurial / Permutation / Communications protocol / Cryptography / Public-key cryptography / Commitment scheme

Minimal Assumptions for Efficient Mercurial Commitments∗ Yevgeniy Dodis† Abstract Mercurial commitments were introduced by Chase et al. [8] and form a key building block for constructing zero-knowledge sets (introduc

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-11-30 14:18:39
425Secure multi-party computation / IP / Adversary model / Transmission Control Protocol / Cryptography / Mathematics / Computing / Cryptographic protocols / Applied mathematics / Analysis of algorithms

On Achieving the “Best of Both Worlds” in Secure Multiparty Computation∗ Jonathan Katz† Abstract Two settings are typically considered for secure multiparty computation, depending on

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-01-08 13:33:41
426Internet / Ssh-keygen / Remote desktop / Internet protocols / Internet standards / Cryptographic protocols / NX technology / SSH File Transfer Protocol / File Transfer Protocol / Computing / Software / Secure Shell

CÉCI/CISM HPC training sessions http://www.ceci-hpc.be & http://www.cism.ucl.ac.be (mainly the FAQ) dao = dt_r_debut01@DAO-01

Add to Reading List

Source URL: www.cism.ucl.ac.be

Language: English - Date: 2014-10-21 03:22:37
427Cryptographic protocols / Internet protocols / Internet standards / Certificate policy / X.509 / CA/Browser Forum / Revocation list / Online Certificate Status Protocol / Public key certificate / Cryptography / Public-key cryptography / Key management

Microsoft Word - CAB Forum BRdoc

Add to Reading List

Source URL: cabforum.org

Language: English - Date: 2015-05-05 16:52:42
428Data / Internet protocols / Universal composability / Authentication protocol / Password authentication protocol / Radio-frequency identification / Cryptography / Cryptographic protocols / Information

Universally Composable and Forward Secure RFID Authentication and Authenticated Key Exchange Tri van Le, Mike Burmester, Breno de Medeiros Department of Computer Science, Florida State University Tallahassee, Florida, FL

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-12-05 18:44:49
429Computing / Information / Secure multi-party computation / Zero-knowledge proof / Actor model / Communications protocol / Ciphertext indistinguishability / X Window System / Commitment scheme / Cryptographic protocols / Cryptography / Data

What Information is Leaked under Concurrent Composition?∗ Vipul Goyal Microsoft Research India and

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-04 11:22:52
430Universal composability / Authentication protocol / Password authentication protocol / Secure multi-party computation / Integrated Windows Authentication / Authentication / Password / Man-in-the-middle attack / Kerberos / Cryptography / Cryptographic protocols / Security

Secure Computation Without Authentication∗ Boaz Barak† Ran Canetti‡ Yehuda Lindell§

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-08-20 14:16:00
UPDATE