Secure channel

Results: 85



#Item
11

Protecting Web-based Single Sign-on Protocols against Relying Party Impersonation Attacks through a Dedicated Bi-directional Authenticated Secure Channel Yinzhi Cao† , Yan Shoshitaishvili‡ , Kevin Borgolte‡ , Chris

Add to Reading List

Source URL: www.yinzhicao.org

Language: English - Date: 2014-07-10 00:48:42
    12

    Benchmarking the utility of a quantum channel for secure communications∗ David Elkouss and Sergii Strelchuk Abstract The private capacity gauges the practical value of quantum channels for secure communications. Unfort

    Add to Reading List

    Source URL: 2015.qcrypt.net

    Language: English - Date: 2015-09-14 07:10:50
      13

      T ECHNICAL R EPORT Report No. CS2012-02 Date: September 2012 Compositional Reasoning for Channel-Based Concurrent Resource

      Add to Reading List

      Source URL: secure.um.edu.mt

      Language: English - Date: 2012-11-02 10:02:20
        14Cryptography / Public-key cryptography / Signcryption / Authenticated encryption / Cryptographic protocol / Secure channel / Key authentication / Serge Vaudenay / Encryption / Block cipher / Draft:C. Pandu Rangan / Index of cryptography articles

        - Call for participation The Ninth International Conference on Provable Security (ProvSecNovember 24-26, 2015 Kanazawa, Japan Web Page: https://security-lab.jaist.ac.jp/provsec2015/ Contact: provsec2015-info@aqua.

        Add to Reading List

        Source URL: security-lab.jaist.ac.jp

        Language: English - Date: 2015-11-09 21:16:55
        15

        COSADESecond International Workshop on Constructive Side-Channel Analysis and Secure Design Software Implementation of Dual-Rail Representation Philippe HOOGVORST () Guilla

        Add to Reading List

        Source URL: cosade2011.cased.de

        Language: English - Date: 2011-03-19 08:43:05
          16

          Secure Modular Password Authentication for the Web using Channel Bindings Mark Manulis, Douglas Stebila, Nick Denham SSR 2014@RHUL

          Add to Reading List

          Source URL: ssr2015.com

          Language: English - Date: 2015-06-22 06:35:15
            17

            Secure Two-Party Computation over a Z-Channel Paolo Palmieri and Olivier Pereira Universit´e catholique de Louvain UCL Crypto Group, ICTEAM Institute Place du Levant 3, B-1348 Louvain-la-Neuve, Belgium

            Add to Reading List

            Source URL: www.uclouvain.be

            Language: English - Date: 2012-11-06 12:33:24
              18

              Secure Modular Password Authentication for the Web Using Channel Bindings Mark Manulis1 , Douglas Stebila2 , and Nick Denham2 1 Surrey Centre for Cyber Security, University of Surrey, UK

              Add to Reading List

              Source URL: manulis.eu

              Language: English - Date: 2015-03-31 12:21:55
                19

                Strengthening Master Secrets! (to get good TLS Channel Identifiers) K Bhargavan, A Delignat-Lavaud, A Pironti (INRIA) A Langley (Google), M Ray (Microsoft) https://secure-resumption.com

                Add to Reading List

                Source URL: www.secure-resumption.com

                Language: English - Date: 2014-03-06 08:15:02
                  20

                  A Block Cipher based Pseudo Random Number Generator Secure Against Side-Channel Key Recovery Christophe Petit 1,∗, François-Xavier Standaert 1,† , Olivier Pereira 1,¦ , Tal G. Malkin 2 , Moti Yung 2,3 . UCL Crypto

                  Add to Reading List

                  Source URL: www.uclouvain.be

                  Language: English - Date: 2011-12-14 05:30:39
                    UPDATE