Key agreement and digital signature are two significant and most useful contributions of modern cryptography. Such protocols and schemes allow two or more parties to establish a common session key securely in the presence of a malicious adversary and provide means of ensuring data origin authentication, data integrity and non-repudiation. Thus, secure key agreement protocols and signature schemes are fundamental building blocks for constructing complex higher-level protocols. In this thesis, we deal with security analysis of existing key agreement protocols and digital signature schemes. We examine ten authenticated key agreement protocols without key confirmation, out of which half are two-party and the other half are three-party, and one...
AbstractAuthenticated key exchange protocols have been developed to establish secure channel on the ...
ACM Symposium on Information, Computer and Communications Security, ASIACCS '08; Tokyo; Japan; 18 Ma...
Recently Eun-Kyung Ryu, Eun-Jun Yoon, and Kee-Young Yoo proposed an efficient ID-based authenticated...
Abstract. Since Bellare and Rogaway’s work in 1994, the indistinguishability-based security models o...
Key agreement allows multi-parties exchanging public information to create a common secret key that ...
Unforgeabilty is a primitive property of a secure digital signature. As two extensions of digital si...
In this paper we analyse the security of two authenticated group key agreement schemes based on the ...
This paper proposes new protocols for two goals: authenticated key agreement and authenticated key a...
Tseng and his colleagues have proposed two variants of authenticated encryption scheme using self-ce...
Abstract. In this paper we analyse the security of two authenticated group key agreement schemes bas...
This paper proposes new protocols for two goals: authenticated key agreement and authenticated key a...
Abstract. We investigate a number of issues related to identity based authenticated key agreement pr...
Abstract. We investigate a number of issues related to identity based authenticated key agreement pr...
Unconditionally secure signature (USS) schemes provide the ability to electronically sign documents ...
[[abstract]]By its very nature, a non-authenticated multi-party key agreement protocol cannot provid...
AbstractAuthenticated key exchange protocols have been developed to establish secure channel on the ...
ACM Symposium on Information, Computer and Communications Security, ASIACCS '08; Tokyo; Japan; 18 Ma...
Recently Eun-Kyung Ryu, Eun-Jun Yoon, and Kee-Young Yoo proposed an efficient ID-based authenticated...
Abstract. Since Bellare and Rogaway’s work in 1994, the indistinguishability-based security models o...
Key agreement allows multi-parties exchanging public information to create a common secret key that ...
Unforgeabilty is a primitive property of a secure digital signature. As two extensions of digital si...
In this paper we analyse the security of two authenticated group key agreement schemes based on the ...
This paper proposes new protocols for two goals: authenticated key agreement and authenticated key a...
Tseng and his colleagues have proposed two variants of authenticated encryption scheme using self-ce...
Abstract. In this paper we analyse the security of two authenticated group key agreement schemes bas...
This paper proposes new protocols for two goals: authenticated key agreement and authenticated key a...
Abstract. We investigate a number of issues related to identity based authenticated key agreement pr...
Abstract. We investigate a number of issues related to identity based authenticated key agreement pr...
Unconditionally secure signature (USS) schemes provide the ability to electronically sign documents ...
[[abstract]]By its very nature, a non-authenticated multi-party key agreement protocol cannot provid...
AbstractAuthenticated key exchange protocols have been developed to establish secure channel on the ...
ACM Symposium on Information, Computer and Communications Security, ASIACCS '08; Tokyo; Japan; 18 Ma...
Recently Eun-Kyung Ryu, Eun-Jun Yoon, and Kee-Young Yoo proposed an efficient ID-based authenticated...