Anonymous two-factor authentication in distributed systems: Certain goals are beyond attainment

D Wang, D He, P Wang, CH Chu - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
Despite two decades of intensive research, it remains a challenge to design a practical
anonymous two-factor authentication scheme, for the designers are confronted with an …

[图书][B] An Introduction to Cryptography

J Hoffstein, J Pipher, JH Silverman, J Hoffstein… - 2014 - Springer
An Introduction to Cryptography | SpringerLink Skip to main content Advertisement SpringerLink
Account Menu Find a journal Publish with us Track your research Search Cart Book cover An …

Curve25519: new Diffie-Hellman speed records

DJ Bernstein - Public Key Cryptography-PKC 2006: 9th International …, 2006 - Springer
This paper explains the design and implementation of a high-security elliptic-curve-Diffie-
Hellman function achieving record-setting speeds: eg, 832457 Pentium III cycles (with …

[图书][B] Introduction to cryptography

H Delfs, H Knebl, H Knebl - 2002 - Springer
VI Preface methods from information theory. Unconditionally secure schemes are now
addressed in an extra chapter, Chapter 10.• Unconditional security is not achievable without …

[图书][B] Protocols for authentication and key establishment

C Boyd, A Mathuria, D Stebila - 2003 - Springer
The first edition of this book was published in 2003. Inevitably, certain parts of the book
became outdated quickly. At the same time new developments have continued apace …

[HTML][HTML] Review of the use of human senses and capabilities in cryptography

K Halunen, OM Latvala - Computer Science Review, 2021 - Elsevier
Cryptography is a key element in establishing trust and enabling services in the digital
world. Currently, cryptography is realized with mathematical operations and represented in …

Threshold and multi-signature schemes from linear hash functions

S Tessaro, C Zhu - Annual International Conference on the Theory and …, 2023 - Springer
This paper gives new constructions of two-round multi-signa-tures and threshold signatures
for which security relies solely on either the hardness of the (plain) discrete logarithm …

Sok: Science, security and the elusive goal of security as a scientific pursuit

C Herley, PC Van Oorschot - 2017 IEEE symposium on security …, 2017 - ieeexplore.ieee.org
The past ten years has seen increasing calls to make security research more “scientific”. On
the surface, most agree that this is desirable, given universal recognition of “science” as a …

The random oracle model: a twenty-year retrospective

N Koblitz, AJ Menezes - Designs, Codes and Cryptography, 2015 - Springer
It has been roughly two decades since the random oracle model for reductionist security
arguments was introduced and one decade since we first discussed the controversy that had …

[图书][B] Solving the Pell equation

MJ Jacobson, HC Williams - 2009 - Springer
Solving the Pell Equation Page 1 Michael J. Jacobson, Jr. Hugh C. Williams CMS Books in
Mathematics Solving the Pell Equation Canadian Mathematical Society Société mathématique …