Computer security
D Gollmann - Wiley Interdisciplinary Reviews: Computational …, 2010 - Wiley Online Library
Computer security encompasses concepts and methods for protecting sensitive resources in
computer systems. Computer security starts from the policies that regulate access to …
computer systems. Computer security starts from the policies that regulate access to …
Authenticated Diffe-Hellman key agreement protocols
S Blake-Wilson, A Menezes - International Workshop on Selected Areas in …, 1998 - Springer
This paper surveys recent work on the design and analysis of key agreement protocols that
are based on the intractability of the Diffe-Hellman problem. The focus is on protocols that …
are based on the intractability of the Diffe-Hellman problem. The focus is on protocols that …
Block design-based key agreement for group data sharing in cloud computing
Data sharing in cloud computing enables multiple participants to freely share the group data,
which improves the efficiency of work in cooperative environments and has widespread …
which improves the efficiency of work in cooperative environments and has widespread …
[图书][B] Understanding cryptography
This is the second edition of Understanding Cryptography. Ever since we released the first
edition in 2009, we have been humbled by the many positive responses we received from …
edition in 2009, we have been humbled by the many positive responses we received from …
Lattice cryptography for the internet
C Peikert - International workshop on post-quantum cryptography, 2014 - Springer
In recent years, lattice-based cryptography has been recognized for its many attractive
properties, such as strong provable security guarantees and apparent resistance to quantum …
properties, such as strong provable security guarantees and apparent resistance to quantum …
Charm: a framework for rapidly prototyping cryptosystems
We describe Charm, an extensible framework for rapidly prototyping cryptographic systems.
Charm provides a number of features that explicitly support the development of new …
Charm provides a number of features that explicitly support the development of new …
Elliptic curve cryptography
D Hankerson, A Menezes - Encyclopedia of Cryptography, Security and …, 2021 - Springer
Background Elliptic curve cryptographic schemes were proposed independently in 1985 by
Neal Koblitz (Koblitz 1987) and Victor Miller (Miller 1986). They are the elliptic curve …
Neal Koblitz (Koblitz 1987) and Victor Miller (Miller 1986). They are the elliptic curve …
Cryptographic extraction and key derivation: The HKDF scheme
H Krawczyk - Annual Cryptology Conference, 2010 - Springer
In spite of the central role of key derivation functions (KDF) in applied cryptography, there
has been little formal work addressing the design and analysis of general multi-purpose …
has been little formal work addressing the design and analysis of general multi-purpose …
[图书][B] Protocols for authentication and key establishment
The first edition of this book was published in 2003. Inevitably, certain parts of the book
became outdated quickly. At the same time new developments have continued apace …
became outdated quickly. At the same time new developments have continued apace …
HMQV: A high-performance secure Diffie-Hellman protocol
H Krawczyk - Annual international cryptology conference, 2005 - Springer
The MQV protocol of Law, Menezes, Qu, Solinas and Vanstone is possibly the most efficient
of all known authenticated Diffie-Hellman protocols that use public-key authentication. In …
of all known authenticated Diffie-Hellman protocols that use public-key authentication. In …