Frodo: Take off the ring! practical, quantum-secure key exchange from LWE
Lattice-based cryptography offers some of the most attractive primitives believed to be
resistant to quantum computers. Following increasing interest from both companies and …
resistant to quantum computers. Following increasing interest from both companies and …
Post-quantum key exchange for the TLS protocol from the ring learning with errors problem
Lattice-based cryptographic primitives are believed to offer resilience against attacks by
quantum computers. We demonstrate the practicality of post-quantum key exchange by …
quantum computers. We demonstrate the practicality of post-quantum key exchange by …
Post-quantum authentication in TLS 1.3: a performance study
D Sikeridis, P Kampanakis… - Cryptology ePrint Archive, 2020 - eprint.iacr.org
The potential development of large-scale quantum computers is raising concerns among IT
and security research professionals due to their ability to solve (elliptic curve) discrete …
and security research professionals due to their ability to solve (elliptic curve) discrete …
Prototy** post-quantum and hybrid key exchange and authentication in TLS and SSH
Once algorithms for quantum-resistant key exchange and digital signature schemes are
selected by standards bodies, adoption of post-quantum cryptography will depend on …
selected by standards bodies, adoption of post-quantum cryptography will depend on …
An anonymity communication protocol for security and privacy of clients in IoT-based mobile health transactions
R Attarian, S Hashemi - Computer Networks, 2021 - Elsevier
Mobile Health (mHealth) technology facilitates patients' care and decreases healthcare
costs by remotely monitoring healthcare processes and medical data management …
costs by remotely monitoring healthcare processes and medical data management …
[PDF][PDF] Implementation of elliptic curve digital signature algorithm
ABSTRACT The Elliptic Curve Digital Signature Algorithm (ECDSA) is the elliptic curve
analogue of the Digital Signature Algorithm (DSA). It was accepted in 1999 as an ANSI …
analogue of the Digital Signature Algorithm (DSA). It was accepted in 1999 as an ANSI …
[HTML][HTML] Enhanced secure anonymous authentication scheme for roaming service in global mobility networks
User authentication scheme is an important issue for providing secure roaming service to
users of mobile devices. In 2008, Wu, Lee and Tsaur proposed an enhanced anonymous …
users of mobile devices. In 2008, Wu, Lee and Tsaur proposed an enhanced anonymous …
On the security of TLS renegotiation
F Giesen, F Kohlar, D Stebila - Proceedings of the 2013 ACM SIGSAC …, 2013 - dl.acm.org
The Transport Layer Security (TLS) protocol is the most widely used security protocol on the
Internet. It supports negotiation of a wide variety of cryptographic primitives through different …
Internet. It supports negotiation of a wide variety of cryptographic primitives through different …
Robust authentication and key agreement scheme preserving the privacy of secret key
In ubiquitous computing environments, people may obtain their services from application
servers by using mobile devices at any time and anywhere. For convenience, most of those …
servers by using mobile devices at any time and anywhere. For convenience, most of those …
Improving secure server performance by re-balancing SSL/TLS handshakes
Much of today's distributed computing takes place in a client/server model. Despite
advances in fault tolerance-in particular, replication and load distribution--server overload …
advances in fault tolerance-in particular, replication and load distribution--server overload …