×

Found 273 Documents (Results 1–100)

An efficient privacy-preserving scheme for weak password collection in Internet of Things. (English) Zbl 1543.94781

Ge, Chunpeng (ed.) et al., Information security and cryptology. 19th international conference, Inscrypt 2023, Hangzhou, China, December 9–10, 2023. Revised selected papers. Part II. Singapore: Springer. Lect. Notes Comput. Sci. 14527, 389-393 (2024).
Full Text: DOI

An efficient strong asymmetric PAKE compiler instantiable from group actions. (English) Zbl 1542.94158

Guo, Jian (ed.) et al., Advances in cryptology – ASIACRYPT 2023. 29th international conference on the theory and application of cryptology and information security, Guangzhou, China, December 4–8, 2023. Proceedings. Part VIII. Singapore: Springer. Lect. Notes Comput. Sci. 14445, 176-207 (2023).
Full Text: DOI

A generic construction of tightly secure password-based authenticated key exchange. (English) Zbl 1542.94160

Guo, Jian (ed.) et al., Advances in cryptology – ASIACRYPT 2023. 29th international conference on the theory and application of cryptology and information security, Guangzhou, China, December 4–8, 2023. Proceedings. Part VIII. Singapore: Springer. Lect. Notes Comput. Sci. 14445, 143-175 (2023).
MSC:  94A62 94A60
Full Text: DOI

Generalized fuzzy password-authenticated key exchange from error correcting codes. (English) Zbl 1542.94149

Guo, Jian (ed.) et al., Advances in cryptology – ASIACRYPT 2023. 29th international conference on the theory and application of cryptology and information security, Guangzhou, China, December 4–8, 2023. Proceedings. Part VIII. Singapore: Springer. Lect. Notes Comput. Sci. 14445, 110-142 (2023).
MSC:  94A62 94A60
Full Text: DOI

A universally composable PAKE with zero communication cost. (And why it shouldn’t be considered UC-secure). (English) Zbl 1527.94063

Boldyreva, Alexandra (ed.) et al., Public-key cryptography – PKC 2023. 26th IACR international conference on practice and theory of public-key cryptography, Atlanta, GA, USA, May 7–10, 2023. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13940, 714-743 (2023).
MSC:  94A60 94A62
Full Text: DOI

GeT a CAKE: Generic Transformations from Key encaspulation mechanisms to password Authenticated Key Exchanges. (English) Zbl 1542.94148

Tibouchi, Mehdi (ed.) et al., Applied cryptography and network security. 21st international conference, ACNS 2023, Kyoto, Japan, June 19–22, 2023. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13906, 516-538 (2023).
MSC:  94A62 94A60 81P94
Full Text: DOI

Quantum-resistant password-based threshold single-sign-on authentication with updatable server private key. (English) Zbl 1524.68043

Atluri, Vijayalakshmi (ed.) et al., Computer security – ESORICS 2022. 27th European symposium on research in computer security, Copenhagen, Denmark, September 26–30, 2022. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13555, 295-316 (2022).
Full Text: DOI

Auditable asymmetric password authenticated public key establishment. (English) Zbl 1527.94078

Beresford, Alastair R. (ed.) et al., Cryptology and network security. 21st international conference, CANS 2022, Abu Dhabi, United Arab Emirates, November 13–16, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13641, 122-142 (2022).
MSC:  94A62 94A60 68P25
Full Text: DOI

Password-authenticated key exchange from group actions. (English) Zbl 1517.94175

Dodis, Yevgeniy (ed.) et al., Advances in cryptology – CRYPTO 2022. 42nd annual international cryptology conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15–18, 2022. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13508, 699-728 (2022).
MSC:  94A62 94A60
Full Text: DOI

CHIP and CRISP: protecting all parties against compromise through identity-binding PAKEs. (English) Zbl 1517.94186

Dodis, Yevgeniy (ed.) et al., Advances in cryptology – CRYPTO 2022. 42nd annual international cryptology conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15–18, 2022. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13508, 668-698 (2022).
MSC:  94A62 94A60 68P25
Full Text: DOI

Password protected secret sharing from lattices. (English) Zbl 1492.94193

Sako, Kazue (ed.) et al., Applied cryptography and network security. 19th international conference, ACNS 2021, Kamakura, Japan, June 21–24, 2021. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12726, 442-459 (2021).
MSC:  94A62 94A60 81P94
Full Text: DOI

Fuzzy asymmetric password-authenticated key exchange. (English) Zbl 1508.94063

Moriai, Shiho (ed.) et al., Advances in cryptology – ASIACRYPT 2020. 26th international conference on the theory and application of cryptology and information security, Daejeon, South Korea, December 7–11, 2020. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12492, 761-784 (2020).
MSC:  94A62 94A60
Full Text: DOI

PAKEs: new framework, new techniques and more efficient lattice-based constructions in the standard model. (English) Zbl 1501.94069

Kiayias, Aggelos (ed.) et al., Public-key cryptography – PKC 2020. 23rd IACR international conference on practice and theory of public-key cryptography, Edinburgh, UK, May 4–7, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12110, 396-427 (2020).
MSC:  94A62 94A60

Formal methods analysis of the secure remote password protocol. (English) Zbl 07370023

Nigam, Vivek (ed.) et al., Logic, language, and security. Essays dedicated to Andre Scedrov on the occasion of his 65th birthday. Cham: Springer. Lect. Notes Comput. Sci. 12300, 103-126 (2020).
MSC:  68-XX 94-XX

Provably secure three-party password-based authenticated key exchange from RLWE. (English) Zbl 1500.94075

Heng, Swee-Huay (ed.) et al., Information security practice and experience. 15th international conference, ISPEC 2019, Kuala Lumpur, Malaysia, November 26–28, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11879, 56-72 (2019).
MSC:  94A62 94A60 81P94
Full Text: DOI

Data-independent memory hard functions: new attacks and stronger constructions. (English) Zbl 1509.94067

Boldyreva, Alexandra (ed.) et al., Advances in cryptology – CRYPTO 2019. 39th annual international cryptology conference, Santa Barbara, CA, USA, August 18–22, 2019. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11693, 573-607 (2019).
MSC:  94A60 68P25
Full Text: DOI

Round-reduced modular construction of asymmetric password-authenticated key exchange. (English) Zbl 1517.94196

Catalano, Dario (ed.) et al., Security and cryptography for networks. 11th international conference, SCN 2018, Amalfi, Italy, September 5–7, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11035, 485-504 (2018).
MSC:  94A62 94A60
Full Text: DOI

Computing low-weight discrete logarithms. (English) Zbl 1384.94074

Adams, Carlisle (ed.) et al., Selected areas in cryptography – SAC 2017. 24th international conference, Ottawa, ON, Canada, August 16–18, 2017. Revised selected papers. Cham: Springer (ISBN 978-3-319-72564-2/pbk; 978-3-319-72565-9/ebook). Lecture Notes in Computer Science 10719, 106-126 (2018).
MSC:  94A60 94A62 11T71
Full Text: DOI

Security on “Secure remote login scheme with password and smart card update facilities”. (English) Zbl 1461.68048

Giri, Debasis (ed.) et al., Mathematics and computing. Third international conference, ICMC 2017, Haldia, India, January 17–21, 2017. Proceedings. Singapore: Springer. Commun. Comput. Inf. Sci. 655, 26-33 (2017).
MSC:  68M25 94A60 94A62
Full Text: DOI

IND-PCA secure KEM is enough for password-based authenticated key exchange (short paper). (English) Zbl 1398.94180

Obana, Satoshi (ed.) et al., Advances in information and computer security. 12th international workshop on security, IWSEC 2017, Hiroshima, Japan, August 30 – September 1, 2017. Proceedings. Cham: Springer (ISBN 978-3-319-64199-7/pbk; 978-3-319-64200-0/ebook). Lecture Notes in Computer Science 10418, 231-241 (2017).
MSC:  94A60 94A62
Full Text: DOI

The iterated random function problem. (English) Zbl 1425.94049

Takagi, Tsuyoshi (ed.) et al., Advances in cryptology – ASIACRYPT 2017. 23rd international conference on the theory and applications of cryptology and information security, Hong Kong, China, December 3–7, 2017. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 10625, 667-697 (2017).
MSC:  94A60
Full Text: DOI

Scrypt is maximally memory-hard. (English) Zbl 1394.94925

Coron, Jean-Sébastien (ed.) et al., Advances in cryptology – EUROCRYPT 2017. 36th annual international conference on the theory and applications of cryptographic techniques, Paris, France, April 30 – May 4, 2017. Proceedings. Part III. Cham: Springer (ISBN 978-3-319-56616-0/pbk; 978-3-319-56617-7/ebook). Lecture Notes in Computer Science 10212, 33-62 (2017).
MSC:  94A60 68Q10
Full Text: DOI

Removing erasures with explainable hash proof systems. (English) Zbl 1383.94012

Fehr, Serge (ed.), Public-key cryptography – PKC 2017. 20th IACR international conference on practice and theory in public-key cryptography, Amsterdam, The Netherlands, March 28–31, 2017. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-54364-1/pbk; 978-3-662-54365-8/ebook). Lecture Notes in Computer Science 10174, 151-174 (2017).
MSC:  94A60 94A62 68P25
Full Text: DOI

Error-correction coding and decoding. Bounds, codes, decoders, analysis and applications. (English) Zbl 1375.94005

Signals and Communication Technology. Cham: Springer Open (ISBN 978-3-319-51102-3/hbk; 978-3-319-51103-0/ebook). xx, 522 p., open access (2017).
Full Text: DOI

Balloon hashing: a memory-hard function providing provable protection against sequential attacks. (English) Zbl 1404.94043

Cheon, Jung Hee (ed.) et al., Advances in cryptology – ASIACRYPT 2016. 22nd international conference on the theory and application of cryptology and information security, Hanoi, Vietnam, December 4–8, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-53886-9/pbk; 978-3-662-53887-6/ebook). Lecture Notes in Computer Science 10031, 220-248 (2016).
MSC:  94A60 68P25
Full Text: DOI

Mitigating server breaches in password-based authentication: secure and efficient solutions. (English) Zbl 1332.94085

Sako, Kazue (ed.), Topics in cryptology – CT-RSA 2016. The cryptographers’ track at the RSA conference 2016, San Francisco, CA, USA, February 29 – March 4, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-29484-1/pbk; 978-3-319-29485-8/ebook). Lecture Notes in Computer Science 9610, 3-18 (2016).
MSC:  94A62 94A60

PUF-based mutual multifactor entity and transaction authentication for secure banking. (English) Zbl 1412.94227

Güneysu, Tim (ed.) et al., Lightweight cryptography for security and privacy. 4th international workshop, LightSec 2015, Bochum, Germany, September 10–11, 2015. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 9542, 77-96 (2016).
MSC:  94A62 94A60
Full Text: DOI

Interleaving cryptanalytic time-memory trade-offs on non-uniform distributions. (English) Zbl 1504.94097

Pernul, Günther (ed.) et al., Computer security – ESORICS 2015. 20th European symposium on research in computer security, Vienna, Austria, September 21–25, 2015. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 9326, 165-184 (2015).
MSC:  94A60

Tradeoff cryptanalysis of memory-hard functions. (English) Zbl 1382.94065

Iwata, Tetsu (ed.) et al., Advances in cryptology – ASIACRYPT 2015. 21st international conference on the theory and application of cryptology and information security, Auckland, New Zealand, November 29 – December 3, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-48799-0/pbk; 978-3-662-48800-3/ebook). Lecture Notes in Computer Science 9453, 633-657 (2015).
MSC:  94A60 68P25
Full Text: DOI

Stand-by attacks on E-ID password authentication. (English) Zbl 1403.94062

Lin, Dongdai (ed.) et al., Information security and cryptology. 10th international conference, Inscrypt 2014, Beijing, China, December 13–15, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-16744-2/pbk; 978-3-319-16745-9/ebook). Lecture Notes in Computer Science 8957, 475-495 (2015).
MSC:  94A60 94A62
Full Text: DOI

Rig: a simple, secure and flexible design for password hashing. (English) Zbl 1403.94046

Lin, Dongdai (ed.) et al., Information security and cryptology. 10th international conference, Inscrypt 2014, Beijing, China, December 13–15, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-16744-2/pbk; 978-3-319-16745-9/ebook). Lecture Notes in Computer Science 8957, 361-381 (2015).
MSC:  94A60
Full Text: DOI

Bad directions in cryptographic hash functions. (English) Zbl 1391.94729

Foo, Ernest (ed.) et al., Information security and privacy. 20th Australasian conference, ACISP 2015, Brisbane, QLD, Australia, June 29 – July 1, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-19961-0/pbk; 978-3-319-19962-7/ebook). Lecture Notes in Computer Science 9144, 488-508 (2015).
MSC:  94A60

Filter Results by …

Document Type

all top 5

Author

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software