Abstract. The notion of authenticator, proposed by Bellare et al., is to transform a protocol secure in the authenticated-link model to a new one secure in the unauthenticated-link model. This notion admits a modular design and analysis of cryptographic protocols and thus greatly simplifies the underlying tasks. However, all previous authenticators are constructed via a so called MT-authenticator. This kind of authenticator authenticates each message independently. Thus, the round complexity of the resulting protocol is amplified by a multiplicative factor. In this paper, we propose two efficient authenticators which authenticate the protocol as a whole and the round complexity of the resulting protocol increases only by at most an additive...
We introduce new authenticated key exchange protocols which on the one hand do not resort to standar...
Abstract. In this paper we present a general framework for passwordbased authenticated key exchange ...
Abstract. Deniable authentication is a technique that allows one party to send messages to another w...
Abstract This paper presents an improved password-based authenticated key exchange protocols inthe c...
We show a general framework for constructing password-based authenticated key exchange protocols wit...
Abstract In this paper we present a general framework for password-based authenticated key exchangep...
A password-based authentication mechanism, first proposed by Halevi and Krawczyk, is used to formall...
There has been much interest in password-authenticated key-exchange protocols which remain secure ev...
With the advancement in Internet-based technologies, network applications are no longer just limited...
Abstract. This paper presents an improved password-based authenti-cated key exchange protocol in the...
Abstract. One-round authenticated key exchange (ORKE) is an es-tablished research area, with many pr...
Tight security is increasingly gaining importance in real-world cryptography, as it allows to choose...
In this paper, we propose two authenticated key exchange (AKE) protocols, SMEN and SMEN−, whic...
Abstract Entity authentication and key distribution are central cryptographic problems in distribute...
Abstract Entity authentication and key distribution are central cryptographic problems in distribute...
We introduce new authenticated key exchange protocols which on the one hand do not resort to standar...
Abstract. In this paper we present a general framework for passwordbased authenticated key exchange ...
Abstract. Deniable authentication is a technique that allows one party to send messages to another w...
Abstract This paper presents an improved password-based authenticated key exchange protocols inthe c...
We show a general framework for constructing password-based authenticated key exchange protocols wit...
Abstract In this paper we present a general framework for password-based authenticated key exchangep...
A password-based authentication mechanism, first proposed by Halevi and Krawczyk, is used to formall...
There has been much interest in password-authenticated key-exchange protocols which remain secure ev...
With the advancement in Internet-based technologies, network applications are no longer just limited...
Abstract. This paper presents an improved password-based authenti-cated key exchange protocol in the...
Abstract. One-round authenticated key exchange (ORKE) is an es-tablished research area, with many pr...
Tight security is increasingly gaining importance in real-world cryptography, as it allows to choose...
In this paper, we propose two authenticated key exchange (AKE) protocols, SMEN and SMEN−, whic...
Abstract Entity authentication and key distribution are central cryptographic problems in distribute...
Abstract Entity authentication and key distribution are central cryptographic problems in distribute...
We introduce new authenticated key exchange protocols which on the one hand do not resort to standar...
Abstract. In this paper we present a general framework for passwordbased authenticated key exchange ...
Abstract. Deniable authentication is a technique that allows one party to send messages to another w...