Self-certified keys—concepts and applications

H Petersenl, P Horster - Communications and Multimedia Security: Volume …, 1997 - Springer
The authenticity of public keys in an asymmetric cryptosystem can be gained in two different
ways: either it is verified explicitly after knowing the public key and its certificate, eg X. 509 …

Digital signcryption or how to achieve cost (signature & encryption)≪ cost (signature)+ cost (encryption)

Y Zheng - Advances in Cryptology—CRYPTO'97: 17th Annual …, 1997 - Springer
Secure and authenticated message delivery/storage is one of the major aims of computer
and communication security research. The current standard method to achieve this aim is …

A hierarchy of authentication specifications

G Lowe - Proceedings 10th computer security foundations …, 1997 - ieeexplore.ieee.org
Many security protocols have the aim of authenticating one agent to another. Yet there is no
clear consensus in the academic literature about precisely what" authentication" means. We …

Key agreement protocols and their security analysis

S Blake-Wilson, D Johnson, A Menezes - IMA international conference on …, 1997 - Springer
This paper proposes new protocols for two goals: authenticated key agreement and
authenticated key agreement with key confirmation in the asymmetric (public-key) setting. A …

Anonymous connections and onion routing

PF Syverson, DM Goldschlag… - Proceedings. 1997 IEEE …, 1997 - ieeexplore.ieee.org
Onion routing provides anonymous connections that are strongly resistant to both
eavesdropping and traffic analysis. Unmodified Internet applications can use these …

A key recovery attack on discrete log-based schemes using a prime order subgroup

CH Lim, PJ Lee - Advances in Cryptology—CRYPTO'97: 17th Annual …, 1997 - Springer
Consider the well-known oracle attack: somehow one gets a certain computation result as a
function of a secret key from the secret key owner and tries to extract some information on …

Strategies against replay attacks

T Aura - Proceedings 10th Computer Security Foundations …, 1997 - ieeexplore.ieee.org
The goal of the paper is to present a set of design principles for avoiding replay attacks in
cryptographic protocols. The principles are easily applied to real protocols and they do not …

Method and apparatus for secure remote authentication in a public network

A Aziz - US Patent 5,604,803, 1997 - Google Patents
57 ABSTRACT A client workstation provides a login address as an anony mous ftp (file
transfer protocol) request, and a password as a user's e-mail address. A destination server …

Entity authentication and authenticated key transport protocols employing asymmetric techniques

S Blake-Wilson, A Menezes - International Workshop on Security Protocols, 1997 - Springer
This paper investigates security proofs for protocols that employ asymmetric (public-key
techniques to solve two problems: entity authentication and authenticated key transport. A …

[PDF][PDF] Maintaining authenticated communication in the presence of break-ins

R Canetti, S Halevi, A Herzberg - Proceedings of the sixteenth annual …, 1997 - dl.acm.org
The contribution of this paper is twofold. First we present a mathematical model for analyzing
this scenario, and exhibit various properties and parameters of this model. Next we describe …