Skip to main content
    • by 
    • perfect forward secrecy (PFS)
We present the SIGMA family of key-exchange protocols and the “SIGn-and-MAc” approach to authenticated Diffie-Hellman underlying its design. The SIGMA protocols provide perfect forward secrecy via a Diffie-Hellman exchange authenticated... more
    • by 
    •   5  
      Digital SignatureCryptoDesign Rationaleperfect forward secrecy (PFS)
We describe Just Fast Keying (JFK), a new key-exchange protocol, primarily designed for use in the IP security architecture. It is simple, efficient, and secure; we sketch a proof of the latter property. JFK also has a number of novel... more
    • by 
    •   12  
      Information SystemsComputer ScienceDistributed Denial of Service AttackCryptography
    • by 
    •   5  
      Digital SignatureInstant MessagingSocial CommunicationOnline Community
    • by 
    •   6  
      Provable SecurityRandom Oracle ModelWide Area NetworkGroup Key Exchange
    • by 
    •   20  
      EngineeringTechnologyComputer NetworksAccess Control
    • by 
    •   4  
      EngineeringPasswordsEfficiencyperfect forward secrecy (PFS)
The advent of the IoT with an estimated 50 billion internet enabled devices by the year 2020 raises questions about the suitability and scalability of existing mechanisms to provide privacy, data integrity and end-entity authentication... more
    • by 
    •   11  
      Computer ScienceWireless Sensor NetworksInternet of ThingsData Privacy
    • by 
    •   15  
      Computer SciencePrivacyEmbedded SystemsWireless Sensor Networks
Car accidents kill or injure millions of people every year. Vehicular communication (VC) systems and Cooperative Intelligent Transportation Systems (C-ITS) were introduced to increase road safety and reduce the number of accidents through... more
    • by 
    •   20  
      Information SecurityVehicular Ad Hoc NetworksCryptographyAuthentication
    • by 
    •   5  
      Digital SignatureInstant MessagingSocial CommunicationOnline Community
    • by 
    •   9  
      Cognitive ScienceDistributed ComputingMobile and Pervasive ComputingWireless Lan
    • by 
    •   4  
      Security AnalysisRandom Oracle Modelperfect forward secrecy (PFS)Prime Number
    • by 
    •   8  
      Privacy Protectionperfect forward secrecy (PFS)Privacy PreservationKey Exchange
Providing security for messages in group communication is more essential and critical nowadays. In group oriented applications such as Video conferencing and entertainment applications, it is necessary to secure the confidential data in... more
    • by 
    •   6  
      Quantum Key Distributionperfect forward secrecy (PFS)Key DistributionKDC (Key Distribution Centre)
sf
    • by 
    • perfect forward secrecy (PFS)
    • by 
    •   27  
      CalculusFunctional ProgrammingLogicHybrid Systems
    • by 
    •   18  
      ModelingComputer SecurityCryptographyAuthentication
    • by 
    •   4  
      Computer Securityperfect forward secrecy (PFS)Key AgreementGroup Key Agreement
In this paper, we propose an efficient password-authenticated key exchange (PAKE) based on RSA, called RSA-EPAKE. Unlike SNAPI using a prime pubic key e greater than an RSA modulus n, RSA-EPAKE uses the public key e of a 96-bit prime,... more
    • by  and +1
    •   4  
      Security AnalysisRandom Oracle Modelperfect forward secrecy (PFS)Prime Number