• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 558
Next 10 →

Shared Cryptographic Bits Via Quantized Quadrature Phase Amplitudes of Light

by Yi Mu, Jennifer Seberry, Yuliang Zheng - PUBLISHED IN OPTICS COMMUNICATIONS 123 , 1996
"... We propose a novel quantum cryptographic protocol without using polarized photons. The protocol consists of an optical coupler and four nonorthogonal coherent states which are analyzed by means of quadrature phase amplitudes of quantized light field. ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
We propose a novel quantum cryptographic protocol without using polarized photons. The protocol consists of an optical coupler and four nonorthogonal coherent states which are analyzed by means of quadrature phase amplitudes of quantized light field.

Establishing Pairwise Keys in Distributed Sensor Networks

by Donggang Liu, Peng Ning , 2003
"... Pairwise key establishment is a fundamental security service in sensor networks; it enables sensor nodes to communicate securely with each other using cryptographic techniques. However, due to the resource constraints on sensors, it is infeasible to use traditional key management techniques such as ..."
Abstract - Cited by 543 (29 self) - Add to MetaCart
such as public key cryptography and key distribution center (KDC). To facilitate the study of novel pairwise key predistribution techniques, this paper presents a general framework for establishing pairwise keys between sensors on the basis of a polynomial-based key predistribution protocol [2]. This paper

Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attacks

by Steven M. Bellovin, Michael Merritt - IEEE SYMPOSIUM ON RESEARCH IN SECURITY AND PRIVACY , 1992
"... Classical cryptographic protocols based on user-chosen keys allow an attacker to mount password-guessing attacks. We introduce a novel combination of asymmetric (public-key) and symmetric (secret-key) cryptography that allow two parties sharing a common password to exchange confidential and authenti ..."
Abstract - Cited by 436 (5 self) - Add to MetaCart
Classical cryptographic protocols based on user-chosen keys allow an attacker to mount password-guessing attacks. We introduce a novel combination of asymmetric (public-key) and symmetric (secret-key) cryptography that allow two parties sharing a common password to exchange confidential

Quantum Cryptographic Key Distribution Protocols

by Lelde Lace, Oksana Scegulnaja-dubrovska, Ramuns Usovs, Agnese Zalcmane
"... Abstract The application of the principles of quantum mechanics to cryptography has led to a respectable new dimension in confidential communication. As a result of these developments, it is now possible to construct cryptographic communication systems which detect unauthorized eavesdropping should ..."
Abstract - Add to MetaCart
Abstract The application of the principles of quantum mechanics to cryptography has led to a respectable new dimension in confidential communication. As a result of these developments, it is now possible to construct cryptographic communication systems which detect unauthorized eavesdropping should

QUANTUM CRYPTOGRAPHIC PROTOCOLS FOR SECURE COMMUNICATION

by N. L. Gupta, D. R. Mehrotra , 2009
"... Abstract: Quantum Cryptography offers a secure method of sharing sequences of random numbers to be used as cryptographic keys. It can potentially eliminate many of the weaknesses of classical cryptographic methods. In this paper, we survey some results in quantum cryptography. After a brief introduc ..."
Abstract - Add to MetaCart
Abstract: Quantum Cryptography offers a secure method of sharing sequences of random numbers to be used as cryptographic keys. It can potentially eliminate many of the weaknesses of classical cryptographic methods. In this paper, we survey some results in quantum cryptography. After a brief

Cryptographic Protocols under Quantum Attacks

by Carolin Lunemann, Phd Dissertation , 2010
"... v2 qu an t-p h] 9 ..."
Abstract - Add to MetaCart
v2 qu an t-p h] 9

Authenticating Pervasive Devices with Human Protocols

by Ari Juels, Stephen A. Weis , 2005
"... Abstract. Forgery and counterfeiting are emerging as serious security risks in low-cost pervasive computing devices. These devices lack the computational, storage, power, and communication resources necessary for most cryptographic authentication schemes. Surprisingly, low-cost pervasive devices lik ..."
Abstract - Cited by 167 (5 self) - Add to MetaCart
active adversaries. The HB + protocol is a novel, symmetric authentication protocol with a simple, low-cost implementation. We prove the security of the HB + protocol against active adversaries based on the hardness of the Learning Parity with Noise (LPN) problem.

Superposition Attacks on Cryptographic Protocols

by Jakob Funder, Jesper Buus Nielsen, Louis Salvail
"... Abstract. Attacks on cryptographic protocols are usually modeled by allowing an adversary to ask queries to an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece of infor ..."
Abstract - Add to MetaCart
Abstract. Attacks on cryptographic protocols are usually modeled by allowing an adversary to ask queries to an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece

Cryptographic Primitives and Quantum Theory

by Claude Crcpeau
"... Abstract only using public key cryptography, but using quan-tum mechanics as a support. This paper summarizes the current knowledge in the field of two-party cryptographic protocols devised f rom quantum systems. W e introduce the reader to the no-tion of cryptographic protocols and describe a numbe ..."
Abstract - Add to MetaCart
Abstract only using public key cryptography, but using quan-tum mechanics as a support. This paper summarizes the current knowledge in the field of two-party cryptographic protocols devised f rom quantum systems. W e introduce the reader to the no-tion of cryptographic protocols and describe a

Cryptographic Primitives and Quantum Theory

by Claude Crépeau , 1993
"... This paper summarizes the current knowledge in the field of two-party cryptographic protocols devised from quantum systems. We introduce the reader to the notion of cryptographic protocols and describe a number of simple building blocks to achieve them. We also give pointers for the reader who is in ..."
Abstract - Cited by 5 (1 self) - Add to MetaCart
This paper summarizes the current knowledge in the field of two-party cryptographic protocols devised from quantum systems. We introduce the reader to the notion of cryptographic protocols and describe a number of simple building blocks to achieve them. We also give pointers for the reader who
Next 10 →
Results 1 - 10 of 558
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University