Frodo: Take off the ring! practical, quantum-secure key exchange from LWE

J Bos, C Costello, L Ducas, I Mironov… - Proceedings of the …, 2016 - dl.acm.org
Lattice-based cryptography offers some of the most attractive primitives believed to be
resistant to quantum computers. Following increasing interest from both companies and …

Post-quantum key exchange for the TLS protocol from the ring learning with errors problem

JW Bos, C Costello, M Naehrig… - 2015 IEEE symposium …, 2015 - ieeexplore.ieee.org
Lattice-based cryptographic primitives are believed to offer resilience against attacks by
quantum computers. We demonstrate the practicality of post-quantum key exchange by …

Post-quantum authentication in TLS 1.3: a performance study

D Sikeridis, P Kampanakis… - Cryptology ePrint Archive, 2020 - eprint.iacr.org
The potential development of large-scale quantum computers is raising concerns among IT
and security research professionals due to their ability to solve (elliptic curve) discrete …

Prototy** post-quantum and hybrid key exchange and authentication in TLS and SSH

E Crockett, C Paquin, D Stebila - Cryptology ePrint Archive, 2019 - eprint.iacr.org
Once algorithms for quantum-resistant key exchange and digital signature schemes are
selected by standards bodies, adoption of post-quantum cryptography will depend on …

An anonymity communication protocol for security and privacy of clients in IoT-based mobile health transactions

R Attarian, S Hashemi - Computer Networks, 2021 - Elsevier
Mobile Health (mHealth) technology facilitates patients' care and decreases healthcare
costs by remotely monitoring healthcare processes and medical data management …

[PDF][PDF] Implementation of elliptic curve digital signature algorithm

A Khalique, K Singh, S Sood - International journal of computer …, 2010 - academia.edu
ABSTRACT The Elliptic Curve Digital Signature Algorithm (ECDSA) is the elliptic curve
analogue of the Digital Signature Algorithm (DSA). It was accepted in 1999 as an ANSI …

[HTML][HTML] Enhanced secure anonymous authentication scheme for roaming service in global mobility networks

H Mun, K Han, YS Lee, CY Yeun, HH Choi - Mathematical and Computer …, 2012 - Elsevier
User authentication scheme is an important issue for providing secure roaming service to
users of mobile devices. In 2008, Wu, Lee and Tsaur proposed an enhanced anonymous …

On the security of TLS renegotiation

F Giesen, F Kohlar, D Stebila - Proceedings of the 2013 ACM SIGSAC …, 2013 - dl.acm.org
The Transport Layer Security (TLS) protocol is the most widely used security protocol on the
Internet. It supports negotiation of a wide variety of cryptographic primitives through different …

Robust authentication and key agreement scheme preserving the privacy of secret key

RC Wang, WS Juang, CL Lei - Computer Communications, 2011 - Elsevier
In ubiquitous computing environments, people may obtain their services from application
servers by using mobile devices at any time and anywhere. For convenience, most of those …

Improving secure server performance by re-balancing SSL/TLS handshakes

C Castelluccia, E Mykletun, G Tsudik - … of the 2006 ACM Symposium on …, 2006 - dl.acm.org
Much of today's distributed computing takes place in a client/server model. Despite
advances in fault tolerance-in particular, replication and load distribution--server overload …