Anonymous two-factor authentication in distributed systems: Certain goals are beyond attainment
Despite two decades of intensive research, it remains a challenge to design a practical
anonymous two-factor authentication scheme, for the designers are confronted with an …
anonymous two-factor authentication scheme, for the designers are confronted with an …
[图书][B] An Introduction to Cryptography
An Introduction to Cryptography | SpringerLink Skip to main content Advertisement SpringerLink
Account Menu Find a journal Publish with us Track your research Search Cart Book cover An …
Account Menu Find a journal Publish with us Track your research Search Cart Book cover An …
Curve25519: new Diffie-Hellman speed records
DJ Bernstein - Public Key Cryptography-PKC 2006: 9th International …, 2006 - Springer
This paper explains the design and implementation of a high-security elliptic-curve-Diffie-
Hellman function achieving record-setting speeds: eg, 832457 Pentium III cycles (with …
Hellman function achieving record-setting speeds: eg, 832457 Pentium III cycles (with …
[图书][B] Introduction to cryptography
H Delfs, H Knebl, H Knebl - 2002 - Springer
VI Preface methods from information theory. Unconditionally secure schemes are now
addressed in an extra chapter, Chapter 10.• Unconditional security is not achievable without …
addressed in an extra chapter, Chapter 10.• Unconditional security is not achievable without …
[图书][B] Protocols for authentication and key establishment
The first edition of this book was published in 2003. Inevitably, certain parts of the book
became outdated quickly. At the same time new developments have continued apace …
became outdated quickly. At the same time new developments have continued apace …
[HTML][HTML] Review of the use of human senses and capabilities in cryptography
K Halunen, OM Latvala - Computer Science Review, 2021 - Elsevier
Cryptography is a key element in establishing trust and enabling services in the digital
world. Currently, cryptography is realized with mathematical operations and represented in …
world. Currently, cryptography is realized with mathematical operations and represented in …
Threshold and multi-signature schemes from linear hash functions
This paper gives new constructions of two-round multi-signa-tures and threshold signatures
for which security relies solely on either the hardness of the (plain) discrete logarithm …
for which security relies solely on either the hardness of the (plain) discrete logarithm …
Sok: Science, security and the elusive goal of security as a scientific pursuit
C Herley, PC Van Oorschot - 2017 IEEE symposium on security …, 2017 - ieeexplore.ieee.org
The past ten years has seen increasing calls to make security research more “scientific”. On
the surface, most agree that this is desirable, given universal recognition of “science” as a …
the surface, most agree that this is desirable, given universal recognition of “science” as a …
The random oracle model: a twenty-year retrospective
N Koblitz, AJ Menezes - Designs, Codes and Cryptography, 2015 - Springer
It has been roughly two decades since the random oracle model for reductionist security
arguments was introduced and one decade since we first discussed the controversy that had …
arguments was introduced and one decade since we first discussed the controversy that had …
[图书][B] Solving the Pell equation
MJ Jacobson, HC Williams - 2009 - Springer
Solving the Pell Equation Page 1 Michael J. Jacobson, Jr. Hugh C. Williams CMS Books in
Mathematics Solving the Pell Equation Canadian Mathematical Society Société mathématique …
Mathematics Solving the Pell Equation Canadian Mathematical Society Société mathématique …