On fast and provably secure message authentication based on universal hashing
V Shoup - Annual International Cryptology Conference, 1996 - Springer
There are well-known techniques for message authentication using universal hash
functions. This approach seems very promising, as it provides schemes that are both …
functions. This approach seems very promising, as it provides schemes that are both …
Authenticated multi-party key agreement
M Just, S Vaudenay - … —ASIACRYPT'96: International Conference on the …, 1996 - Springer
We examine key agreement protocols providing (i) key authentication (ii) key confirmation
and (iii) forward secrecy. Attacks are presented against previous two-party key agreement …
and (iii) forward secrecy. Attacks are presented against previous two-party key agreement …
[PDF][PDF] 物联网安全关键技术与挑战
武传坤 - 密码学报, 2015 - jcr.cacrnet.org.cn
物联网是信息技术发展到一定阶段的产物, 是全球信息产业和技术的又一次飞跃.
物联网的发展非常迅速, 市场潜力巨大. 同时, 物联网的信息安全问题是关系物联网产业能否安全 …
物联网的发展非常迅速, 市场潜力巨大. 同时, 物联网的信息安全问题是关系物联网产业能否安全 …
Cryptographic primitives for information authentication—State of the art
B Preneel - State of the Art in Applied Cryptography: Course on …, 1999 - Springer
This paper describes the state of the art for cryptographic primitives that are used for
protecting the authenticity of information: cryptographic hash functions and digital signature …
protecting the authenticity of information: cryptographic hash functions and digital signature …
Designated verifier signature schemes: Attacks, new security notions and a new construction
We show that the signer can abuse the disavowal protocol in the Jakobsson-Sako-
Impagliazzo designated-verifier signature scheme. In addition, we identify a new security …
Impagliazzo designated-verifier signature scheme. In addition, we identify a new security …
[图书][B] Formal aspects of mobile code security
RD Dean - 1999 - search.proquest.com
We believe that formal methods of all kinds are critical to mobile code security, as one route
to gaining the assurance level necessary for running potentially hostile code on a routine …
to gaining the assurance level necessary for running potentially hostile code on a routine …
Practice-oriented provable-security
M Bellare - International workshop on information security, 1997 - Springer
This short article is intended to complement my invited talk at this conference. 1 I would like
to try to introduce you to a certain, relatively new, sub-area of cryptography that we have …
to try to introduce you to a certain, relatively new, sub-area of cryptography that we have …
A new variant of PMAC: beyond the birthday bound
K Yasuda - Annual Cryptology Conference, 2011 - Springer
We propose a PMAC-type mode of operation that can be used as a highly secure MAC
(Message Authentication Code) or PRF (Pseudo-Random Function). Our scheme is based …
(Message Authentication Code) or PRF (Pseudo-Random Function). Our scheme is based …
On the security of HMAC and NMAC based on HAVAL, MD4, MD5, SHA-0 and SHA-1
HMAC is a widely used message authentication code and a pseudorandom function
generator based on cryptographic hash functions such as MD5 and SHA-1. It has been …
generator based on cryptographic hash functions such as MD5 and SHA-1. It has been …