[图书][B] Understanding cryptography
This is the second edition of Understanding Cryptography. Ever since we released the first
edition in 2009, we have been humbled by the many positive responses we received from …
edition in 2009, we have been humbled by the many positive responses we received from …
Cryptographic extraction and key derivation: The HKDF scheme
H Krawczyk - Annual Cryptology Conference, 2010 - Springer
In spite of the central role of key derivation functions (KDF) in applied cryptography, there
has been little formal work addressing the design and analysis of general multi-purpose …
has been little formal work addressing the design and analysis of general multi-purpose …
Systems and methods for secure transaction management and electronic rights protection
KL Ginter, VH Shear, FJ Spahn, DM Van Wie - US Patent 7,844,835, 2010 - Google Patents
First worldwide family litigation filed litigation Critical https://patents. darts-ip. com/? family=
32686239&utm_source= google_patent&utm_medium= platform_link&utm_campaign …
32686239&utm_source= google_patent&utm_medium= platform_link&utm_campaign …
Distributed private-key generators for identity-based cryptography
A Kate, I Goldberg - … Conference on Security and Cryptography for …, 2010 - Springer
An identity-based encryption (IBE) scheme can greatly reduce the complexity of sending
encrypted messages. However, an IBE scheme necessarily requires a private-key generator …
encrypted messages. However, an IBE scheme necessarily requires a private-key generator …
Design principles for power grid cyber-infrastructure authentication protocols
Recently, there has been an increased focus and a sense of urgency in developing
standards for Power Grid systems centered on the need for interoperability. Given the threat …
standards for Power Grid systems centered on the need for interoperability. Given the threat …
On Robust Key Agreement Based on Public Key Authentication: (Short Paper)
F Hao - Financial Cryptography and Data Security: 14th …, 2010 - Springer
We describe two new attacks on the HMQV protocol. The first attack raises a serious
question on the basic definition of “authentication” in HMQV, while the second attack is …
question on the basic definition of “authentication” in HMQV, while the second attack is …
ECGK: An efficient clustering scheme for group key management in MANETs
Mobile Ad hoc NETworks (or MANETs) are flexible networks that are expected to support
emerging group applications such as spontaneous collaborative activities and rescue …
emerging group applications such as spontaneous collaborative activities and rescue …
Cryptography and evidence
M Roe - 2010 - cl.cam.ac.uk
The invention of public-key cryptography led to the notion that cryptographically protected
messages could be used as evidence to convince an impartial adjudicator that a disputed …
messages could be used as evidence to convince an impartial adjudicator that a disputed …
Okamoto-Tanaka revisited: Fully authenticated Diffie-Hellman with minimal overhead
This paper investigates the question of whether a key agreement protocol with the same
communication complexity as the original Diffie-Hellman protocol (DHP)(two messages with …
communication complexity as the original Diffie-Hellman protocol (DHP)(two messages with …
The TLS handshake protocol: A modular analysis
P Morrissey, NP Smart, B Warinschi - Journal of Cryptology, 2010 - Springer
We study the security of the widely deployed Secure Session Layer/Transport Layer Security
(TLS) key agreement protocol. Our analysis identifies, justifies, and exploits the modularity …
(TLS) key agreement protocol. Our analysis identifies, justifies, and exploits the modularity …