Journal of Symbolic Computation
An efficient probabilistic public key encryption scheme which hides all partial information
Proceedings of CRYPTO 84 on Advances in cryptology
User functions for the generation and distribution of encipherment keys
Proc. of the EUROCRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques
Non-interactive zero-knowledge and its applications
STOC '88 Proceedings of the twentieth annual ACM symposium on Theory of computing
Proving security against chosen cyphertext attacks
CRYPTO '88 Proceedings on Advances in cryptology
ACM SIGSAC Review
Making distributed multimedia systems secure: the switchboard approach
ACM SIGOPS Operating Systems Review
Applying cryptographic techniques to problems in media space security
COCS '95 Proceedings of conference on Organizational computing systems
Certificate based PKI and B2B E-commerce: suitable match or not?
Sec '01 Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge
Convertible authenticated encryption scheme
Journal of Systems and Software
A Trapdoor Permutation Equivalent to Factoring
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
VLSI Implementation of Modulo Multiplication Using Carry Free Addition
VLSID '97 Proceedings of the Tenth International Conference on VLSI Design: VLSI in Multimedia Applications
DDH-based group key agreement in a mobile environment
Journal of Systems and Software
Threshold circuit lower bounds on cryptographic functions
Journal of Computer and System Sciences
A password authentication scheme over insecure networks
Journal of Computer and System Sciences
Electronic signatures: a brief review of the literature
ICEC '06 Proceedings of the 8th international conference on Electronic commerce: The new e-commerce: innovations for conquering current barriers, obstacles and limitations to conducting successful business on the internet
Attacking elliptic curve cryptosystems with special-purpose hardware
Proceedings of the 2007 ACM/SIGDA 15th international symposium on Field programmable gate arrays
Cryptographic key exchange based on locationing information
Pervasive and Mobile Computing
Off-line password-guessing attack to Peyravian-Jeffries's remote user authentication protocol
Computer Communications
Security flaws of remote user access over insecure networks
Computer Communications
Two-tier authentication for cluster and individual sets in mobile ad hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Cryptanalysis of tripartite and multi-party authenticated key agreement protocols
Information Sciences: an International Journal
A lightweight and anonymous copyright-protection protocol
Computer Standards & Interfaces
New Vistas in elliptic curve cryptography
Information Security Tech. Report
Cramer-Damgård signatures revisited: Efficient flat-tree signatures based on factoring
Theoretical Computer Science
Self-certified signature scheme from pairings
Journal of Systems and Software
SEAL: A secure communication library for building dynamic group key agreement applications
Journal of Systems and Software
Vulnerabilities of generalized MQV key agreement protocol without using one-way hash functions
Computer Standards & Interfaces
Design, Analysis and Performance Evaluation of Group Key Establishment in Wireless Sensor Networks
Electronic Notes in Theoretical Computer Science (ENTCS)
Security enhancement of an IC-card-based remote login mechanism
Computer Networks: The International Journal of Computer and Telecommunications Networking
Secure multicast in dynamic environments
Computer Networks: The International Journal of Computer and Telecommunications Networking
Secure communications with an asymptotic secrecy model
Knowledge-Based Systems
Alternating two-way AC-tree automata
Information and Computation
A communication-efficient and fault-tolerant conference-key agreement protocol with forward secrecy
Journal of Systems and Software
LFSR multipliers over GF(2m) defined by all-one polynomial
Integration, the VLSI Journal
Non-interactive key establishment in mobile ad hoc networks
Ad Hoc Networks
An efficient CSA architecture for montgomery modular multiplication
Microprocessors & Microsystems
Performance study of Byzantine Agreement Protocol with artificial neural network
Information Sciences: an International Journal
Pair-wise path key establishment in wireless sensor networks
Computer Communications
A survey of key management schemes in wireless sensor networks
Computer Communications
A provably secure short signature scheme based on discrete logarithms
Information Sciences: an International Journal
Information Sciences: an International Journal
HW/SW co-design for public-key cryptosystems on the 8051 micro-controller
Computers and Electrical Engineering
A new characterization of dual bases in finite fields and its applications
Discrete Applied Mathematics
Packet construction for secure conference call request in ad hoc network systems
Information Sciences: an International Journal
Convertible multi-authenticated encryption scheme
Information Sciences: an International Journal
Communication-efficient AUTHMAC_DH protocols
Computer Standards & Interfaces
Computer Standards & Interfaces
Multichannel Security Protocols
IEEE Pervasive Computing
Authenticated multiple key exchange protocols based on elliptic curves and bilinear pairings
Computers and Electrical Engineering
Cryptanalysis of e-mail protocols providing perfect forward secrecy
Computer Standards & Interfaces
Trusted Directory Services for Secure Internet Connectivity
Electronic Notes in Theoretical Computer Science (ENTCS)
A novel secret image sharing scheme in color images using small shadow images
Information Sciences: an International Journal
A Clustering-based Group Key Agreement Protocol for Ad-Hoc Networks
Electronic Notes in Theoretical Computer Science (ENTCS)
An electronic voting protocol with deniable authentication for mobile ad hoc networks
Computer Communications
Computer Networks: The International Journal of Computer and Telecommunications Networking
A novel secure communication scheme in vehicular ad hoc networks
Computer Communications
A round- and computation-efficient three-party authenticated key exchange protocol
Journal of Systems and Software
Distributed key management for dynamic groups in MANETs
Pervasive and Mobile Computing
A novel approach for bit-serial AB2 multiplication in finite fields GF(2m)
Computers & Mathematics with Applications
Lower bounds and new constructions on secure group communication schemes
Theoretical Computer Science
USIM-based EAP-TLS authentication protocol for wireless local area networks
Computer Standards & Interfaces
The anatomy study of server-initial agreement for general hierarchy wired/wireless networks
Computer Standards & Interfaces
Research on anonymous signatures and group signatures
Computer Communications
The ring authenticated encryption scheme - How to provide a clue wisely
Information Sciences: an International Journal
An improved identity-based key agreement protocol and its security proof
Information Sciences: an International Journal
A novel access control protocol for secure sensor networks
Computer Standards & Interfaces
A novel application of grey system theory to information security (Part I)
Computer Standards & Interfaces
A conference key agreement protocol with fault-tolerant capability
Computer Standards & Interfaces
Spontaneous mobile device authentication based on sensor data
Information Security Tech. Report
An efficient end-to-end security mechanism for IP multimedia subsystem
Computer Communications
A trust-based secure service discovery (TSSD) model for pervasive computing
Computer Communications
Information Sciences: an International Journal
Information Sciences: an International Journal
Elliptic curve based hardware architecture using cellular automata
Mathematics and Computers in Simulation
Two efficient two-factor authenticated key exchange protocols in public wireless LANs
Computers and Electrical Engineering
A self-verification authentication mechanism for mobile satellite communication systems
Computers and Electrical Engineering
Short fail-stop signature scheme based on factorization and discrete logarithm assumptions
Theoretical Computer Science
Security flaw of Hölbl et al.'s protocol
Computer Communications
Enhanced authentication scheme with anonymity for roaming service in global mobility networks
Computer Communications
Convertible multi-authenticated encryption scheme with one-way hash function
Computer Communications
On the transferability of private signatures
Information Sciences: an International Journal
New cryptosystems design based on hybrid-mode problems
Computers and Electrical Engineering
Provably secure proxy-protected signature schemes based on RSA
Computers and Electrical Engineering
Analysis and design of a secure key exchange scheme
Information Sciences: an International Journal
Ring signature scheme for ECC-based anonymous signcryption
Computer Standards & Interfaces
An efficient proxy raffle protocol with anonymity-preserving
Computer Standards & Interfaces
Efficient self-certified proxy CAE scheme and its variants
Journal of Systems and Software
Research of the chinese CAPTCHA system based on AJAX
WSEAS Transactions on Circuits and Systems
Quasi-quadratic elliptic curve point counting using rigid cohomology
Journal of Symbolic Computation
Efficient and provably secure password-based group key agreement protocol
Computer Standards & Interfaces
Communication-efficient three-party protocols for authentication and key agreement
Computers & Mathematics with Applications
Secure group communication in wireless mesh networks
Ad Hoc Networks
Secured communication protocol for internetworking ZigBee cluster networks
Computer Communications
Two improved two-party identity-based authenticated key agreement protocols
Computer Standards & Interfaces
An ID-based group-oriented decryption scheme secure against adaptive chosen-ciphertext attacks
Computer Communications
Security of self-certified signatures
Information Processing Letters
An on-line electronic check system with mutual authentication
Computers and Electrical Engineering
Accurate and large-scale privacy-preserving data mining using the election paradigm
Data & Knowledge Engineering
Secure remote user access over insecure networks
Computer Communications
SCON: Secure management of continuity in sensor networks
Computer Communications
Byzantine fault tolerant public key authentication in peer-to-peer systems
Computer Networks: The International Journal of Computer and Telecommunications Networking - Management in peer-to-peer systems
A note on efficient implementation of prime generation algorithms in small portable devices
Computer Networks: The International Journal of Computer and Telecommunications Networking
An ID-based multisignature scheme without reblocking and predetermined signing order
Computer Standards & Interfaces
An efficient password authenticated key exchange protocol for imbalanced wireless networks
Computer Standards & Interfaces
Byzantine Agreement under dual failure mobile network
Computer Standards & Interfaces
Password authenticated key exchange protocols among diverse network domains
Computers and Electrical Engineering
A traceable E-cash transfer system against blackmail via subliminal channel
Electronic Commerce Research and Applications
Simple authenticated key agreement and protected password change protocol
Computers & Mathematics with Applications
Enhancement of two-factor authenticated key exchange protocols in public wireless LANs
Computers and Electrical Engineering
Simulatable certificateless two-party authenticated key agreement protocol
Information Sciences: an International Journal
An Optimized Intruder Model for SAT-based Model-Checking of Security Protocols
Electronic Notes in Theoretical Computer Science (ENTCS)
Attacking Group Multicast Key Management Protocols Using Coral
Electronic Notes in Theoretical Computer Science (ENTCS)
Electronic Notes in Theoretical Computer Science (ENTCS)
Survey on anonymous communications in computer networks
Computer Communications
Enhancing data security in ad hoc networks based on multipath routing
Journal of Parallel and Distributed Computing
Secure information storage and retrieval using new results in cryptography
Information Processing Letters
A secure and scalable Group Key Exchange system
Information Processing Letters
Distribution of digital contents based on public key considering execution speed and security
Information Sciences: an International Journal
Recent developments in cryptographic hash functions: Security implications and future directions
Information Security Tech. Report
Efficient parallel exponentiation in GF(qn) using normal basis representations
Journal of Algorithms
Performance study of online batch-based digital signature schemes
Journal of Network and Computer Applications
Simple password-based three-party authenticated key exchange without server public keys
Information Sciences: an International Journal
Public-key cryptosystems based on composite degree residuosity classes
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
ECGK: An efficient clustering scheme for group key management in MANETs
Computer Communications
An efficient user authentication and key exchange protocol for mobile client-server environment
Computer Networks: The International Journal of Computer and Telecommunications Networking
Adaptive security protocol selection for mobile computing
Journal of Network and Computer Applications
A secure and efficient SIP authentication scheme for converged VoIP networks
Computer Communications
Secure group key agreement protocol based on chaotic Hash
Information Sciences: an International Journal
Efficient proxy signcryption scheme with provable CCA and CMA security
Computers & Mathematics with Applications
Efficient cluster-based group key agreement protocols for wireless ad hoc networks
Journal of Network and Computer Applications
Efficient key management for preserving HIPAA regulations
Journal of Systems and Software
Identity based encryption: Progress and challenges
Information Security Tech. Report
Public-key encryption based on Chebyshev polynomials over GF(q)
Information Processing Letters
Proxy encryption based secure multicast in wireless mesh networks
Journal of Network and Computer Applications
Secure key management scheme for dynamic hierarchical access control based on ECC
Journal of Systems and Software
A lightweight group-key management protocol for secure ad-hoc-network routing
Computer Networks: The International Journal of Computer and Telecommunications Networking
Dynamic asymmetric group key agreement for ad hoc networks
Ad Hoc Networks
Provably secure and efficient identification and key agreement protocol with user anonymity
Journal of Computer and System Sciences
Self-generated-certificate public key encryption without pairing and its application
Information Sciences: an International Journal
Practical electronic auction scheme with strong anonymity and bidding privacy
Information Sciences: an International Journal
Strongly secure identity-based authenticated key agreement protocols
Computers and Electrical Engineering
Vulnerability of two multiple-key agreement protocols
Computers and Electrical Engineering
Efficient identity-based authenticated multiple key exchange protocol
Computers and Electrical Engineering
A survey on automatic configuration of virtual private networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Discrete logarithm based additively homomorphic encryption and secure data aggregation
Information Sciences: an International Journal
Security weaknesses of authenticated key agreement protocols
Information Processing Letters
Extended KCI attack against two-party key establishment protocols
Information Processing Letters
Provably secure one-round identity-based authenticated asymmetric group key agreement protocol
Information Sciences: an International Journal
Confidential deniable authentication using promised signcryption
Journal of Systems and Software
Computer Networks: The International Journal of Computer and Telecommunications Networking
A clique-based secure admission control scheme for mobile ad hoc networks (MANETs)
Journal of Network and Computer Applications
Research challenges towards the Future Internet
Computer Communications
A round-optimal three-party ID-based authenticated key agreement protocol
Information Sciences: an International Journal
An improved two-party identity-based authenticated key agreement protocol using pairings
Journal of Computer and System Sciences
Parallel modular exponentiation using load balancing without precomputation
Journal of Computer and System Sciences
Two-server password-only authenticated key exchange
Journal of Computer and System Sciences
Tractable rational map signature
PKC'05 Proceedings of the 8th international conference on Theory and Practice in Public Key Cryptography
Improving the efficiency of anonymous routing for MANETs
Computer Communications
A public key cryptosystem based on three new provable problems
Theoretical Computer Science
Journal of Computational and Applied Mathematics
Strongly secure certificateless short signatures
Journal of Systems and Software
Identity based secure AODV and TCP for mobile ad hoc networks
Proceedings of the 1st International Conference on Wireless Technologies for Humanitarian Relief
SP 800-12. An Introduction to Computer Security: the NIST Handbook
SP 800-12. An Introduction to Computer Security: the NIST Handbook
SP 800-21 Second edition. Guideline for Implementing Cryptography in the Federal Government
SP 800-21 Second edition. Guideline for Implementing Cryptography in the Federal Government
SP 800-32. Introduction to Public Key Technology and the Federal PKI Infrastructure
SP 800-32. Introduction to Public Key Technology and the Federal PKI Infrastructure
Provably convertible multi-authenticated encryption scheme for generalized group communications
Information Sciences: an International Journal
Novel Approach for fast Compressed Hybrid color image Cryptosystem
Advances in Engineering Software
Private data deduplication protocols in cloud storage
Proceedings of the 27th Annual ACM Symposium on Applied Computing
Research notes: Method for constructing a group-oriented cipher system
Computer Communications
Secure end-to-end delegations in distributed systems
Computer Communications
I: Basic technologies: The US key escrow encryption technology
Computer Communications
I: Basic technologies: Modern key agreement techniques
Computer Communications
I: Basic technologies: TESS: A security system based on discrete exponentiation
Computer Communications
Review: Artificial intelligence approaches to network management: recent advances and a survey
Computer Communications
Secure broadcasting in large networks
Computer Communications
Research note: Three ID-based information security functions
Computer Communications
Research note: Authenticity of public keys in asymmetric cryptosystems
Computer Communications
An efficient and complete remote user authentication scheme using smart cards
Mathematical and Computer Modelling: An International Journal
Prêt à Voter with Paillier encryption
Mathematical and Computer Modelling: An International Journal
How hard is it to control an election?
Mathematical and Computer Modelling: An International Journal
Privacy preserving electronic data gathering
Mathematical and Computer Modelling: An International Journal
Security: Standards for data security - the state of the art
Computer Communications
Practical secure electronic mail system with public key distribution
Computer Communications
Tutorial: Efficient and secure password-based authentication protocols against guessing attacks
Computer Communications
Partially blind threshold signatures based on discrete logarithm
Computer Communications
Decentralized group key management for secure multicast communications
Computer Communications
IPsec-based end-to-end VPN deployment over UMTS
Computer Communications
Information Sciences: an International Journal
Key establishment protocols for secure mobile communications: a critical survey
Computer Communications
Tutorial: Technological infrastructure for PKI and digital certification
Computer Communications
An intensive survey of fair non-repudiation protocols
Computer Communications
Research note: Cryptanalysis of Lee and Chang's ID-based information security functions
Computer Communications
Research note: New generalized group-oriented cryptosystem based on Diffie-Hellman scheme
Computer Communications
A secure and practical electronic voting scheme
Computer Communications
Key agreement in ad hoc networks
Computer Communications
CSP-DHIES: a new public-key encryption scheme from matrix conjugation
Security and Communication Networks
Finite field arithmetic using quasi-normal bases
Finite Fields and Their Applications
On the linear complexity of the Naor-Reingold sequence with elliptic curves
Finite Fields and Their Applications
Computing the modular inverses is as simple as computing the GCDs
Finite Fields and Their Applications
Binary Representations of Finite Fields and Their Application to Complexity Theory
Finite Fields and Their Applications
Finite Fields and Their Applications
Algebraic curves and cryptography
Finite Fields and Their Applications
Application of formal analysis to enhancing trust in a complex grid-based operating system
Proceedings of the 3rd international ACM SIGSOFT symposium on Architecting Critical Systems
Information Sciences: an International Journal
Securing design checking service for the regulation-based product design
Computers in Industry
A novel elliptical curve ID cryptography protocol for multi-hop ZigBee sensor networks
Wireless Communications & Mobile Computing
A More Secure Authentication Scheme for Telecare Medicine Information Systems
Journal of Medical Systems
Redactable Signatures for Signed CDA Documents
Journal of Medical Systems
A Secure Authentication Scheme for Telecare Medicine Information Systems
Journal of Medical Systems
Anonymous overlay network supporting authenticated routing
Information Sciences: an International Journal
A dynamic password-based user authentication scheme for hierarchical wireless sensor networks
Journal of Network and Computer Applications
Improved Pollard rho method for computing discrete logarithms over finite extension fields
Journal of Computational and Applied Mathematics
Resource-competitive analysis: a new perspective on attack-resistant distributed computing
FOMC '12 Proceedings of the 8th International Workshop on Foundations of Mobile Computing
An ID-based cryptographic mechanisms based on GDLP and IFP
Information Processing Letters
International Journal of Applied Cryptography
Lossy Trapdoor Functions and Their Applications
SIAM Journal on Computing
Mutual remote attestation: enabling system cloning for TPM based platforms
STM'11 Proceedings of the 7th international conference on Security and Trust Management
Computationally-Fair group and identity-based key-exchange
TAMC'12 Proceedings of the 9th Annual international conference on Theory and Applications of Models of Computation
Public-Key cryptography from new multivariate quadratic assumptions
PKC'12 Proceedings of the 15th international conference on Practice and Theory in Public Key Cryptography
Generating provable primes efficiently on embedded devices
PKC'12 Proceedings of the 15th international conference on Practice and Theory in Public Key Cryptography
DDH-Like assumptions based on extension rings
PKC'12 Proceedings of the 15th international conference on Practice and Theory in Public Key Cryptography
A secure IRB system for assisting the development of intelligent medical devices
Expert Systems with Applications: An International Journal
The Multivariate Algorithmic Revolution and Beyond
Lossy trapdoor functions from homomorphic reproducible encryption
Information Processing Letters
Hexagonal groups based key management using deployment knowledge in wireless sensor networks
Proceedings of the International Conference on Advances in Computing, Communications and Informatics
Certificateless strong designated verifier multisignature scheme using bilinear pairings
Proceedings of the International Conference on Advances in Computing, Communications and Informatics
Intuitionistic fuzzy estimation of the ant colony optimization starting points
LSSC'11 Proceedings of the 8th international conference on Large-Scale Scientific Computing
Group key agreement for secure group communication in dynamic peer systems
Journal of Parallel and Distributed Computing
Sufficient condition for ephemeral key-leakage resilient tripartite key exchange
ACISP'12 Proceedings of the 17th Australasian conference on Information Security and Privacy
An efficient IND-CCA2 secure variant of the niederreiter encryption scheme in the standard model
ACISP'12 Proceedings of the 17th Australasian conference on Information Security and Privacy
Multifactor authenticated key renewal
INTRUST'11 Proceedings of the Third international conference on Trusted Systems
Design, implementation, and evaluation of a vehicular hardware security module
ICISC'11 Proceedings of the 14th international conference on Information Security and Cryptology
ICISC'11 Proceedings of the 14th international conference on Information Security and Cryptology
Functional encryption: a new vision for public-key cryptography
Communications of the ACM
Diffie-Hellman without difficulty
FAST'11 Proceedings of the 8th international conference on Formal Aspects of Security and Trust
A New Practical Limited Identity-Based Encryption Scheme
Fundamenta Informaticae
Enhanced of Key Agreement Protocols Resistant to a Denial-of-Service Attack
Fundamenta Informaticae
Public-Key Cryptography Based on a Cubic Extension of the Lucas Functions
Fundamenta Informaticae - Cryptology in Progress: 10th Central European Conference on Cryptology, Będlewo Poland, 2010
A Secure Integrated Medical Information System
Journal of Medical Systems
KALwEN: a new practical and interoperable key management scheme for body sensor networks
Security and Communication Networks
Secure cluster header election techniques in sensor network
ISPA'07 Proceedings of the 2007 international conference on Frontiers of High Performance Computing and Networking
An ECC based public key infrastructure usable for mobile applications
Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology
Secure image authentication by distibuted source coding using LDPC encoding
Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology
Efficient password-based authenticated key exchange without public information
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
Provably secure pairing-based convertible undeniable signature with short signature length
Pairing'07 Proceedings of the First international conference on Pairing-Based Cryptography
ZigBee security using identity-based cryptography
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
An approach to a trustworthy system architecture using virtualization
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
A secret-key exponential key agreement protocol with smart cards
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
An efficient ID-based authenticated key agreement protocol with pairings
ISPA'07 Proceedings of the 5th international conference on Parallel and Distributed Processing and Applications
A new scheme for deniable/repudiable authentication
CASC'07 Proceedings of the 10th international conference on Computer Algebra in Scientific Computing
An efficient certified email protocol
ISC'07 Proceedings of the 10th international conference on Information Security
On the concept of software obfuscation in computer security
ISC'07 Proceedings of the 10th international conference on Information Security
Trapdoor permutation polynomials of Z/nZ and public key cryptosystems
ISC'07 Proceedings of the 10th international conference on Information Security
Towards a DL-based additively homomorphic encryption scheme
ISC'07 Proceedings of the 10th international conference on Information Security
A mobile-certificate security method of satellite-earth integration networks
ICICA'12 Proceedings of the Third international conference on Information Computing and Applications
Strongly authenticated key exchange protocol from bilinear groups without random oracles
ProvSec'12 Proceedings of the 6th international conference on Provable Security
Authenticated key exchange with entities from different settings and varied groups
ProvSec'12 Proceedings of the 6th international conference on Provable Security
Journal of Network and Computer Applications
Improved exponentiation and key agreement in the infrastructure of a real quadratic field
LATINCRYPT'12 Proceedings of the 2nd international conference on Cryptology and Information Security in Latin America
Side channel attack to actual cryptanalysis: breaking CRT-RSA with low weight decryption exponents
CHES'12 Proceedings of the 14th international conference on Cryptographic Hardware and Embedded Systems
Secure data transmission with cloud computing in heterogeneous wireless networks
Security and Communication Networks
On the realization of fuzzy identity-based identification scheme using fingerprint biometrics
Security and Communication Networks
Cryptanalysis of an efficient three-party password-based key exchange scheme
International Journal of Communication Systems
Efficient structure-preserving signature scheme from standard assumptions
SCN'12 Proceedings of the 8th international conference on Security and Cryptography for Networks
Decentralized dynamic broadcast encryption
SCN'12 Proceedings of the 8th international conference on Security and Cryptography for Networks
New attacks for knapsack based cryptosystems
SCN'12 Proceedings of the 8th international conference on Security and Cryptography for Networks
Secure multicast key protocol for electronic mail systems with providing perfect forward secrecy
Security and Communication Networks
A security-enhanced key agreement protocol based on chaotic maps
Security and Communication Networks
Coopetitive architecture to support a dynamic and scalable NFC based mobile services architecture
ICICS'12 Proceedings of the 14th international conference on Information and Communications Security
A key sharing fuzzy vault scheme
ICICS'12 Proceedings of the 14th international conference on Information and Communications Security
Limitations of generating a secret key using wireless fading under active adversary
IEEE/ACM Transactions on Networking (TON)
Multi-party quantum key agreement with bell states and bell measurements
Quantum Information Processing
The non-gap sequence of a subcode of a generalized Reed---Solomon code
Designs, Codes and Cryptography
A communication efficient group key distribution scheme for MANETs
NSS'12 Proceedings of the 6th international conference on Network and System Security
Information Sciences: an International Journal
New identity-based three-party authenticated key agreement protocol with provable security
Journal of Network and Computer Applications
A new authenticated group key transfer protocol for actual network environment
International Journal of Ad Hoc and Ubiquitous Computing
On the security of an authenticated group key transfer protocol based on secret sharing
ICT-EurAsia'13 Proceedings of the 2013 international conference on Information and Communication Technology
Speeding up elliptic curve discrete logarithm computations with point halving
Designs, Codes and Cryptography
Anonymity and one-way authentication in key exchange protocols
Designs, Codes and Cryptography
Cryptanalysis and Improvement of Robust Deniable Authentication Protocol
Wireless Personal Communications: An International Journal
Future Generation Computer Systems
Information Sciences: an International Journal
A storage-efficient cryptography-based access control solution for subversion
Proceedings of the 18th ACM symposium on Access control models and technologies
Cryptography with fast point multiplication by using ASCII codes and its implementation
International Journal of Communication Networks and Distributed Systems
A new efficient authenticated multiple-key exchange protocol from bilinear pairings
Computers and Electrical Engineering
Computers and Electrical Engineering
GlassTube: a lightweight approach to web application integrity
Proceedings of the Eighth ACM SIGPLAN workshop on Programming languages and analysis for security
Provably secure three party encrypted key exchange scheme with explicit authentication
Information Sciences: an International Journal
Provably secure certificateless one-way and two-party authenticated key agreement protocol
ICISC'12 Proceedings of the 15th international conference on Information Security and Cryptology
GPU implementation of a scalable non-linear congruential generator for cryptography applications
Proceedings of the 23rd ACM international conference on Great lakes symposium on VLSI
A compact FPGA-based montgomery multiplier over prime fields
Proceedings of the 23rd ACM international conference on Great lakes symposium on VLSI
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
Proofs of retrievability with public verifiability and constant communication cost in cloud
Proceedings of the 2013 international workshop on Security in cloud computing
Impact of trust model on on-demand multi-path routing in mobile ad hoc networks
Computer Communications
Witness encryption and its applications
Proceedings of the forty-fifth annual ACM symposium on Theory of computing
A new elliptic curve cryptosystem for securing sensitive data applications
International Journal of Electronic Security and Digital Forensics
Amplitude demodulation-based EM analysis of different RSA implementations
DATE '12 Proceedings of the Conference on Design, Automation and Test in Europe
Computer Networks: The International Journal of Computer and Telecommunications Networking
Secure scheme against data dropping
Proceedings of the 16th Communications & Networking Symposium
SafeSlinger: easy-to-use and secure public-key exchange
Proceedings of the 19th annual international conference on Mobile computing & networking
Creating secrets out of erasures
Proceedings of the 19th annual international conference on Mobile computing & networking
Proceedings of the 6th International Conference on Rehabilitation Engineering & Assistive Technology
Toward a secure batch verification with group testing for VANET
Wireless Networks
Multimedia Tools and Applications
How to achieve non-repudiation of origin with privacy protection in cloud computing
Journal of Computer and System Sciences
Elliptic curve cryptography based mutual authentication scheme for session initiation protocol
Multimedia Tools and Applications
Single password authentication
Computer Networks: The International Journal of Computer and Telecommunications Networking
OAKE: a new family of implicitly authenticated diffie-hellman protocols
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Efficient targeted key subset retrieval in fractal hash sequences
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Please slow down!: the impact on tor performance from mobility
Proceedings of the Third ACM workshop on Security and privacy in smartphones & mobile devices
A secure channel for attribute-based credentials: [short paper]
Proceedings of the 2013 ACM workshop on Digital identity management
Secure and practical threshold RSA
Proceedings of the 6th International Conference on Security of Information and Networks
Public key exchange using semidirect product of (semi)groups
ACNS'13 Proceedings of the 11th international conference on Applied Cryptography and Network Security
An approach for designing neural cryptography
ISNN'13 Proceedings of the 10th international conference on Advances in Neural Networks - Volume Part I
Non-delegatable strong designated verifier signature using a trusted third party without pairings
AISC '13 Proceedings of the Eleventh Australasian Information Security Conference - Volume 138
Cryptanalysis of Brenner et al.'s somewhat homomorphic encryption scheme
AISC '13 Proceedings of the Eleventh Australasian Information Security Conference - Volume 138
An improved fault-tolerant conference-key agreement protocol with forward secrecy
Proceedings of the 6th International Conference on Security of Information and Networks
Updated recommendations for blinded exponentiation vs. single trace analysis
COSADE'13 Proceedings of the 4th international conference on Constructive Side-Channel Analysis and Secure Design
High-Performance scalar multiplication using 8-dimensional GLV/GLS decomposition
CHES'13 Proceedings of the 15th international conference on Cryptographic Hardware and Embedded Systems
Steal this movie - automatically bypassing DRM protection in streaming media services
SEC'13 Proceedings of the 22nd USENIX conference on Security
On Ideal Lattices and Learning with Errors over Rings
Journal of the ACM (JACM)
Proceedings of the 5th conference on Innovations in theoretical computer science
The truth behind the myth of the folk theorem
Proceedings of the 5th conference on Innovations in theoretical computer science
Go anywhere: user-verifiable authentication over distance-free channel for mobile devices
Personal and Ubiquitous Computing
Two ID-based authenticated schemes with key agreement for mobile environments
The Journal of Supercomputing
IND-CCA secure encryption based on a Zheng-Seberry scheme
Journal of Computational and Applied Mathematics
Message transmission for GH-public key cryptosystem
Journal of Computational and Applied Mathematics
Security weaknesses of a signature scheme and authenticated key agreement protocols
Information Processing Letters
Robust smart card secured authentication scheme on SIP using Elliptic Curve Cryptography
Computer Standards & Interfaces
A semantic analysis of key management protocols for wireless sensor networks
Science of Computer Programming
Improved migration for mobile computing in distributed networks
Computer Standards & Interfaces
Provably secure three-party authenticated key agreement protocol using smart cards
Computer Networks: The International Journal of Computer and Telecommunications Networking
An efficient privacy-preserving solution for finding the nearest doctor
Personal and Ubiquitous Computing
A New Secure Authenticated Group Key Transfer Protocol
Wireless Personal Communications: An International Journal
High Performance Group Merging/Splitting Scheme for Group Key Management
Wireless Personal Communications: An International Journal
Improvements on "multiparty quantum key agreement with single particles"
Quantum Information Processing
A HIPAA-compliant key management scheme with revocation of authorization
Computer Methods and Programs in Biomedicine
A Time and Location Information Assisted OTP Scheme
Wireless Personal Communications: An International Journal
Double Delegation-Based Authentication and Key Agreement Protocol for PCSs
Wireless Personal Communications: An International Journal
Horus: fine-grained encryption-based security for large-scale storage
FAST'13 Proceedings of the 11th USENIX conference on File and Storage Technologies
Mobile Information Systems - Emerging Wireless and Mobile Technologies
On provably secure code-based multiple grade proxy signature scheme
International Journal of High Performance Systems Architecture
Symmetric Threshold Multipath (STM): An online symmetric key management scheme
Information Sciences: an International Journal
Hi-index | 754.86 |
Two kinds of contemporary developments in cryptography are examined. Widening applications of teleprocessing have given rise to a need for new types of cryptographic systems, which minimize the need for secure key distribution channels and supply the equivalent of a written signature. This paper suggests ways to solve these currently open problems. It also discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.