Filters








37,058 Hits in 5.3 sec

Practical and Tightly-Secure Digital Signatures and Authenticated Key Exchange [chapter]

Kristian Gjøsteen, Tibor Jager
<span title="">2018</span> <i title="Springer International Publishing"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
The scheme is based on a new way of applying the Fiat-Shamir approach to construct tightly-secure signatures from certain identification schemes.  ...  However, for many important cryptographic primitives, including digital signatures and authenticated key exchange (AKE), we are still lacking constructions that are suitable for real-world deployment.  ...  The huge complexity of modern security models for authenticated key exchange makes it difficult to construct tightly-secure protocols.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-96881-0_4">doi:10.1007/978-3-319-96881-0_4</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/vly43n24jvehhfyc3ihpswstta">fatcat:vly43n24jvehhfyc3ihpswstta</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190222210832/http://pdfs.semanticscholar.org/3cb1/6f426627af54f5689d537e6c7023e3742fa8.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/3c/b1/3cb16f426627af54f5689d537e6c7023e3742fa8.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-96881-0_4"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Public-Key Cryptography (Dagstuhl Seminar 16371)

Marc Fischlin, Alexander May, David Pointcheval, Tal Rabin, Marc Herbstritt
<span title="2017-01-13">2017</span> <i title="Schloss Dagstuhl Leibniz-Zentrum für Informatik GmbH"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/u2phfyhrhje7xnnubtp3vfklcu" style="color: black;">Dagstuhl Reports</a> </i> &nbsp;
This report documents the program and results of Dagstuhl seminar 16731 "Public-Key Cryptography" which took place September 11-16, 2016.  ...  The goal of the seminar was to bring together different subareas from public-key cryptography and to promote research among these areas.  ...  is transferred from an idealized single-user setting to the more realistic multi-user setting is impossible to avoid, and a lower tightness bound for non-interactive key exchange protocols.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.4230/dagrep.6.9.46">doi:10.4230/dagrep.6.9.46</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/journals/dagstuhl-reports/Fischlin0PR16.html">dblp:journals/dagstuhl-reports/Fischlin0PR16</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/figv27hq4feibl5nzb7snrtm2i">fatcat:figv27hq4feibl5nzb7snrtm2i</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220123034304/https://drops.dagstuhl.de/opus/volltexte/2017/6914/pdf/dagrep_v006_i009_p046_s16371.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/24/c1/24c11c0c775b6ec9c818c77ff44a07e2c488a62b.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.4230/dagrep.6.9.46"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Tightly-Secure Authenticated Key Exchange [chapter]

Christoph Bader, Dennis Hofheinz, Tibor Jager, Eike Kiltz, Yong Li
<span title="">2015</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
We construct the first Authenticated Key Exchange (AKE) protocol whose security does not degrade with an increasing number of users or sessions.  ...  Along the way we develop new, stronger security definitions for digital signatures and key encapsulation mechanisms.  ...  A Tightly-Secure AKE Protocol Secure Authenticated Key-Exchange In this section we present a formal security model for authenticated key-exchange (AKE) protocols.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-46494-6_26">doi:10.1007/978-3-662-46494-6_26</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/mtiwizqx45a4jgktnjwrshmlmm">fatcat:mtiwizqx45a4jgktnjwrshmlmm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170808222212/https://eprint.iacr.org/2014/797.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/df/82/df82e89dc41fabf853fb625a58ae2f82ad51d388.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-46494-6_26"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Lightweight and adaptable solution for security agility

<span title="2016-03-31">2016</span> <i title="Korean Society for Internet Information (KSII)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/hupfbobgkvepdnt5g32qxkypsy" style="color: black;">KSII Transactions on Internet and Information Systems</a> </i> &nbsp;
However, many existing cryptographic mechanisms are tightly integrated into communication protocols.  ...  We also present a solution in the Agile Cryptographic Agreement Protocol (ACAP) that can be adapted on various network layers, architectures and devices.  ...  A new non-interactive key exchange approach [42] is used to minimize RTTs while establishing secure connections.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3837/tiis.2016.03.015">doi:10.3837/tiis.2016.03.015</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/6ik37k5btbhflpouvo64ks42v4">fatcat:6ik37k5btbhflpouvo64ks42v4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220227231118/http://itiis.org/digital-library/manuscript/file/21049/TIISVol10No3-15.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/05/e2/05e28253db52c11800749f9d472c918ad77c94b8.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3837/tiis.2016.03.015"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

The Fairy-Ring Dance

Feng Hao, Xun Yi, Liqun Chen, Siamak Fayyaz Shahandashti
<span title="">2015</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/rau5643b7ncwvh74y6p64hntle" style="color: black;">Proceedings of the 1st ACM Workshop on IoT Privacy, Trust, and Security - IoTPTS &#39;15</a> </i> &nbsp;
In this paper, we study Password Authenticated Key Exchange (PAKE) in a group.  ...  The first protocol, called SPEKE+, accomplishes authenticated key exchange in a group with explicit key confirmation in just two rounds.  ...  Security of J-PAKE+ J-PAKE+ is built on J-PAKE, the Burmester-Desmedt group key agreement protocol, and Schnorr non-interactive ZKP.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2732209.2732212">doi:10.1145/2732209.2732212</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/ccs/HaoYCS15.html">dblp:conf/ccs/HaoYCS15</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/m5dhd3zec5dgxcupnwziia6cby">fatcat:m5dhd3zec5dgxcupnwziia6cby</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20150318111920/http://eprint.iacr.org/2015/080.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/13/81/138182870341427ebf664a4901fdd8038190d27c.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2732209.2732212"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Securing B2B Pervasive Information Sharing between Healthcare Providers: Enabling the Foundation for Evidence based Medicine

Rajesh Vargheese, Prashant Prabhudesai
<span title="">2014</span> <i title="Elsevier BV"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/cx3f4s3qmfe6bg4qvuy2cxezyu" style="color: black;">Procedia Computer Science</a> </i> &nbsp;
based on flow, signature, behavior, packet capturing techniques in addition to security policies and protection schemes are required to ensure security of the information exchanged as well as other threats  ...  Evidence based Medicine is emerging as a key process in Health care to enable insights driven quality care for individual patients.  ...  critical sources, and enabling information sharing. 4 In such interactions where disparate entities, enterprises and businesses exchange information and interact, some of the new challenges relating  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.procs.2014.08.078">doi:10.1016/j.procs.2014.08.078</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/7hrjahtopvb33e6e67kpjbwtzm">fatcat:7hrjahtopvb33e6e67kpjbwtzm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190415065039/https://core.ac.uk/download/pdf/82523541.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/cb/b6/cbb61705620e771916d22b73a92a4dfaedf5d46a.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.procs.2014.08.078"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> elsevier.com </button> </a>

Plug and play encryption [chapter]

Donald Beaver
<span title="">1997</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
We present a novel protocol for secret key exchange that is provably secure against attacks by an adversary that is free to attack zero, one, or both parties in an adaptive fashion, at any time.  ...  We present constructions that are based on a novel and counterintuitive use of the Diffie-Hellman key exchange protocol; our methods extend to other standard cryptographic assumptions as well.  ...  The current work applies this principle one step further, arranging for both the sender and receiver to avoid learning certain information. The result is far greater simplicity and efficiency.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/bfb0052228">doi:10.1007/bfb0052228</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/zcotfnijm5dapemnycp2xpwjyy">fatcat:zcotfnijm5dapemnycp2xpwjyy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180730082357/https://link.springer.com/content/pdf/10.1007%2FBFb0052228.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/df/b8/dfb8128e60a8729d0d1def218e0842d1503cd52e.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/bfb0052228"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

BlendSM-DDM: BLockchain-ENabled Secure Microservices for Decentralized Data Marketplaces [article]

Ronghua Xu, Gowri Sankar Ramachandran, Yu Chen, Bhaskar Krishnamachari
<span title="2019-09-21">2019</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
Traditional security solutions rely on a centralized authority, which can be a performance bottleneck or susceptible to a single point of failure.  ...  Within a permissioned blockchain network, a microservices based security mechanism is introduced to secure data exchange and payment among participants in the marketplace.  ...  While the I3 system facilitates the easy exchange of realtime IoT data streams between devices owners and third-party applications through marketplace, it also brings new concerns on architecture and security  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1909.10888v1">arXiv:1909.10888v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/gfdio7eh6bg6jp5kjrrh2kzy54">fatcat:gfdio7eh6bg6jp5kjrrh2kzy54</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200930180405/https://arxiv.org/pdf/1909.10888v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/79/47/7947fe4227fa9e7cdc97bde8da3dffbdfacfd4ee.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1909.10888v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

ACE of Spades in the IoT Security Game: A Flexible IPsec Security Profile for Access Control

Santiago Aragon, Marco Tiloca, Max Maass, Matthias Hollick, Shahid Raza
<span title="">2018</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/m37r6seibve4bbsmm5f464tigm" style="color: black;">2018 IEEE Conference on Communications and Network Security (CNS)</a> </i> &nbsp;
The ACE framework defines separate profiles to specify how exactly entities interact and what security and communication protocols to use.  ...  We provide the first Open Source implementation of the ACE IPsec profile for the Contiki OS and test it on the resource-constrained Zolertia Firefly platform.  ...  On the left side, we categorized these operations in crypto-and non-crypto-related actions. The Client-to-AS message exchange results are shown in Figure 7 .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/cns.2018.8433209">doi:10.1109/cns.2018.8433209</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/cns/AragonTMHR18.html">dblp:conf/cns/AragonTMHR18</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/pckthj3ol5ar3k3gd63ko6m72q">fatcat:pckthj3ol5ar3k3gd63ko6m72q</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190428211554/http://tuprints.ulb.tu-darmstadt.de/7696/1/main.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/e6/d6/e6d6f12c100dc74259e59f8fe54ddfb81e774758.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/cns.2018.8433209"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Securing Passive Objects in Mobile Ad-Hoc Peer-to-Peer Networks

Rene Mayrhofer, Florian Ortner, Alois Ferscha, Manfred Hechinger
<span title="">2003</span> <i title="Elsevier BV"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/uy5mv2ncw5eahkdx47hkrglxmm" style="color: black;">Electronical Notes in Theoretical Computer Science</a> </i> &nbsp;
To overcome the problem of limited storage capacity on small embedded objects, ECC keys are used.  ...  The SmartInteraction project is an approach to interact with persons, things and places in a natural and non-obtrusive way.  ...  In a typical scenario, the remote proxy peers will either run on trusted embedded devices or on tightly controlled servers, allowing to secure the key. • The public key stored on O can not be changed by  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/s1571-0661(04)80687-x">doi:10.1016/s1571-0661(04)80687-x</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/nx6tkmfcfrhatidwripum55rii">fatcat:nx6tkmfcfrhatidwripum55rii</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20061117083507/http://www.mayrhofer.eu.org:80/downloads/publications/SecCo2003-Securing-Passive-Objects.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/38/21/3821c227757fc6c0037a1aead17fc58381b06487.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/s1571-0661(04)80687-x"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> elsevier.com </button> </a>

Clouds of Things Need Information Flow Control with Hardware Roots of Trust

Thomas F. J.-M. Pasquier, Jatinder Singh, Jean Bacon
<span title="">2015</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/vf7glygozrdhdkhluhlxpb7j4q" style="color: black;">2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom)</a> </i> &nbsp;
There is a clear, outstanding need for new security mechanisms that allow data to be managed and controlled within the cloud-enabled Internet of Things.  ...  Towards this, we propose an approach based on Information Flow Control (IFC) that allows: (1) the continuous, end-to-end enforcement of data flow policy, and (2) the generation of provenance-like audit  ...  The LSM provides security hooks on interactions between kernel objects, which is where DIFC policies are enforced.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/cloudcom.2015.41">doi:10.1109/cloudcom.2015.41</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/cloudcom/PasquierSB15.html">dblp:conf/cloudcom/PasquierSB15</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/tna3qe4grbdyjkh4jwzggnoqda">fatcat:tna3qe4grbdyjkh4jwzggnoqda</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180724150820/https://dash.harvard.edu/bitstream/handle/1/36305748/cloudcom-2015.pdf?sequence=1" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/66/80/66809e86a3efb4a535aaa063ea5558cc1b2f88eb.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/cloudcom.2015.41"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Less is more: relaxed yet composable security notions for key exchange

C. Brzuska, M. Fischlin, N. P. Smart, B. Warinschi, S. C. Williams
<span title="2013-03-16">2013</span> <i title="Springer Nature"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/pmp3fe6mtncjnmxpkeavdxh6sm" style="color: black;">International Journal of Information Security</a> </i> &nbsp;
Specifically, we show that for protocols, whose security relies exclusively on some underlying symmetric primitive, can be securely composed with key exchange protocols provided that two main requirements  ...  In this paper we propose a new security definition for key exchange protocols that offers two important benefits.  ...  for the secure channel that are LHAE-secure, see [38] for most recent results on TLS Record Layer security.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s10207-013-0192-y">doi:10.1007/s10207-013-0192-y</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/2vlji7i2cbce7c4kyjm5pi6ewu">fatcat:2vlji7i2cbce7c4kyjm5pi6ewu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20160806043613/http://eprint.iacr.org/2012/242.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/c3/5d/c35d220749ef15624cbd94b2c7f690ac433db3b2.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s10207-013-0192-y"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

On the Tight Security of TLS 1.3: Theoretically Sound Cryptographic Parameters for Real-World Deployments

Denis Diemert, Tibor Jager
<span title="2021-06-04">2021</span> <i title="Springer Science and Business Media LLC"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/7jmi32x7o5hfnpkgh2irnuqpim" style="color: black;">Journal of Cryptology</a> </i> &nbsp;
Our work also shows that by replacing the RSA-PSS scheme with a tightly secure scheme (e.g., in a future TLS version), one can obtain the first fully tightly secure TLS protocol.  ...  For some building blocks, such as the symmetric record layer encryption scheme, we can then rely on prior work to establish tight security.  ...  Constructing tightly secure authenticated key exchange protocols has turned out to be a difficult task. The first tightly secure AKE protocols were proposed by [4] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s00145-021-09388-x">doi:10.1007/s00145-021-09388-x</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/vhz6kgeejfd7tgfvbowgjbrfne">fatcat:vhz6kgeejfd7tgfvbowgjbrfne</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210718112022/https://link.springer.com/content/pdf/10.1007/s00145-021-09388-x.pdf?error=cookies_not_supported&amp;code=bc260072-1827-4272-b20a-024b1ec62feb" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/ef/7a/ef7aeeda290166487783cfa57089508ed12d012d.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s00145-021-09388-x"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> springer.com </button> </a>

International Relations in the Cyber Age: The Co-Evolution Dilemma. By Nazli Choucri and David Clark. Cambridge, MA: MIT Press, 2018

Mark T. Peters
<span title="">2020</span> <i title="University of South Florida Libraries"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/f4txkqd5u5c73g7kkbhaaumzuq" style="color: black;">Journal of Strategic Security</a> </i> &nbsp;
While many authors have touched on these points over time, one of the biggest challenges remains settling on a community standard where data can be exchanged and evaluated.  ...  identifying changing security threats, and finally, recognizing how cyber as a social system impacts all human interactions.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5038/1944-0472.13.2.1842">doi:10.5038/1944-0472.13.2.1842</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ad36jlxsobfavbid42sljoqe6e">fatcat:ad36jlxsobfavbid42sljoqe6e</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200610090505/https://scholarcommons.usf.edu/cgi/viewcontent.cgi?article=1842&amp;context=jss" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/16/e5/16e5ead7785d19f12bb57b991bc549e71ae166d5.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5038/1944-0472.13.2.1842"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Discovery and capabilities of guard proxies for CoRE networks [article]

Christian Amsüss
<span title="2022-05-28">2022</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
It negotiates an elliptic curve, performs a Diffie-Hellman key exchange on it, and provides keys and parameters for OSCORE.  ...  EDHOC is a work-in-progress lightweight key exchange protocol tailored for OSCORE, and can likewise be transported on top of CoAP [21] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2205.14433v1">arXiv:2205.14433v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/sbcmnfpkofeqjmkaim6n2yuu2i">fatcat:sbcmnfpkofeqjmkaim6n2yuu2i</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220605151119/https://arxiv.org/pdf/2205.14433v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/98/d0/98d0e9d0177d3a6e4b2f42cfafcc255d8d546d2f.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2205.14433v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 37,058 results