[图书][B] Understanding cryptography

C Paar, J Pelzl - 2010 - Springer
This is the second edition of Understanding Cryptography. Ever since we released the first
edition in 2009, we have been humbled by the many positive responses we received from …

Cryptographic extraction and key derivation: The HKDF scheme

H Krawczyk - Annual Cryptology Conference, 2010 - Springer
In spite of the central role of key derivation functions (KDF) in applied cryptography, there
has been little formal work addressing the design and analysis of general multi-purpose …

Systems and methods for secure transaction management and electronic rights protection

KL Ginter, VH Shear, FJ Spahn, DM Van Wie - US Patent 7,844,835, 2010 - Google Patents
First worldwide family litigation filed litigation Critical https://patents. darts-ip. com/? family=
32686239&utm_source= google_patent&utm_medium= platform_link&utm_campaign …

Distributed private-key generators for identity-based cryptography

A Kate, I Goldberg - … Conference on Security and Cryptography for …, 2010 - Springer
An identity-based encryption (IBE) scheme can greatly reduce the complexity of sending
encrypted messages. However, an IBE scheme necessarily requires a private-key generator …

Design principles for power grid cyber-infrastructure authentication protocols

H Khurana, R Bobba, T Yardley… - 2010 43rd Hawaii …, 2010 - ieeexplore.ieee.org
Recently, there has been an increased focus and a sense of urgency in developing
standards for Power Grid systems centered on the need for interoperability. Given the threat …

On Robust Key Agreement Based on Public Key Authentication: (Short Paper)

F Hao - Financial Cryptography and Data Security: 14th …, 2010 - Springer
We describe two new attacks on the HMQV protocol. The first attack raises a serious
question on the basic definition of “authentication” in HMQV, while the second attack is …

ECGK: An efficient clustering scheme for group key management in MANETs

K Drira, H Seba, H Kheddouci - Computer Communications, 2010 - Elsevier
Mobile Ad hoc NETworks (or MANETs) are flexible networks that are expected to support
emerging group applications such as spontaneous collaborative activities and rescue …

Cryptography and evidence

M Roe - 2010 - cl.cam.ac.uk
The invention of public-key cryptography led to the notion that cryptographically protected
messages could be used as evidence to convince an impartial adjudicator that a disputed …

Okamoto-Tanaka revisited: Fully authenticated Diffie-Hellman with minimal overhead

R Gennaro, H Krawczyk, T Rabin - … , ACNS 2010, Beijing, China, June 22 …, 2010 - Springer
This paper investigates the question of whether a key agreement protocol with the same
communication complexity as the original Diffie-Hellman protocol (DHP)(two messages with …

The TLS handshake protocol: A modular analysis

P Morrissey, NP Smart, B Warinschi - Journal of Cryptology, 2010 - Springer
We study the security of the widely deployed Secure Session Layer/Transport Layer Security
(TLS) key agreement protocol. Our analysis identifies, justifies, and exploits the modularity …