• HMQV

  • Referenced in 78 articles [sw02714]
  • possibly the most efficient of all known authenticated Diffie-Hellman protocols that use public ... authentication. In addition to great performance, the protocol has been designed to achieve a remarkable...
  • NAXOS

  • Referenced in 69 articles [sw03050]
  • recently presented a strong security definition for authenticated key agreement strengthening the well-known Canetti ... extremely complicated. This paper proposes a new authenticated key agreement protocol, called CMQV (‘Combined...
  • Keccak

  • Referenced in 71 articles [sw09834]
  • hashing to pseudo-random number generation to authenticated encryption. For a quick introduction, we propose...
  • SPINS

  • Referenced in 50 articles [sw02657]
  • SNEP includes: data confidentiality, two-party data authentication, and evidence of data freshness. µTESLA provides ... authenticated broadcast for severely resource-constrained environments. We implemented the above protocols, and show that...
  • ProVerif

  • Referenced in 41 articles [sw06558]
  • adversary cannot obtain the secret, CSFW’01), authentication (SAS’02) and more generally correspondence properties...
  • CMQV+

  • Referenced in 38 articles [sw06418]
  • CMQV+: an authenticated key exchange protocol from CMQV Ustaoglu presents a secure and efficient...
  • MPICH-G2

  • Referenced in 35 articles [sw02373]
  • services provided by the Globus Toolkit for authentication, authorization, resource allocation, executable staging...
  • NRL

  • Referenced in 34 articles [sw12158]
  • cryptographic protocols that are used to authenticate principals and services and distribute keys...
  • Poly1305-AES

  • Referenced in 17 articles [sw26748]
  • Poly1305-AES message-authentication code. Poly1305-AES is a state-of-the-art message-authentication ... applications. Poly1305-AES computes a 16-byte authenticator of a variable-length message, using ... bytes, the attacker sees at most 264 authenticated messages, and the attacker attempts D forgeries...
  • Quark

  • Referenced in 21 articles [sw08447]
  • construction, Quark can be used for message authentication, stream encryption, or authenticated encryption. Our hardware...
  • MMH

  • Referenced in 14 articles [sw24968]
  • software message authentication in the Gbit/second rates. We describe a construction of almost universal hash ... variable size data and fast cryptographic message authentication. Our construction uses fast single precision arithmetic ... implementations of universal hashing and other message authentication techniques (e.g., MD5-based). Moreover, our construction ... hashing and message authentication...
  • ELmD

  • Referenced in 13 articles [sw20823]
  • ELmD: a pipelineable authenticated encryption and its hardware implementation. Authenticated encryption schemes which resist misuse ... online constructions like McOE, sponge-type authenticated encryptions (such as duplex) and COPA. Only ... paper, we design a new online secure authenticated encryption, called ELmD or Encrypt-Linear...
  • McOE

  • Referenced in 13 articles [sw20876]
  • Family of Almost Foolproof On-Line Authenticated Encryption Schemes. On-Line Authenticated Encryption (OAE) combines ... computable. Most block cipher-based schemes for Authenticated Encryption can be run on-line ... years, cryptographers developed misuse-resistant schemes for Authenticated Encryption. These guarantee excellent security even against...
  • tweakey

  • Referenced in 23 articles [sw12816]
  • significant increase of security of well-known authenticated encryptions mode like Θcb3 from birthday-bound...
  • KNIME

  • Referenced in 22 articles [sw06790]
  • include additional functionalities such as shared repositories, authentication, remote execution, scheduling, SOA integration...
  • TulaFale

  • Referenced in 14 articles [sw00986]
  • SOAP messages), and correspondence assertions (to specify authentication goals of protocols). Our implementation compiles TulaFale ... protocol verifier. Hence, we can automatically verify authentication properties of SOAP protocols...
  • EC2C-PAKA

  • Referenced in 11 articles [sw03308]
  • PAKA: an efficient client-to-client password-authenticated key agreement Most password-authenticated key agreement ... described in the literature have focused on authenticated key agreement using a shared password between ... paper, we study client-to-client password-authenticated key agreement (C2C-PAKA) enabling two clients...
  • BIOMET

  • Referenced in 10 articles [sw02474]
  • BIOMET: A multimodal person authentication database including face, voice, fingerprint, hand and signature modalities. Information ... evolution of man-machine interaction modes. Automated authentication of people could be used to better ... also be enhanced through a better people authentication. Biometrics appears as a promising tool ... improve the performance of a person authentication system, multimodality can be applied. This motivated...
  • G-Hadoop

  • Referenced in 12 articles [sw08480]
  • However, G-Hadoop simply reuses the user authentication and job submission mechanism of Hadoop, which ... environments. This security framework simplifies the users authentication and job submission process of the current...
  • ADSNARK

  • Referenced in 8 articles [sw22496]
  • nearly practical and privacy-preserving proofs on authenticated data. We study the problem of privacy ... preserving proofs on authenticated data, where a party receives data from a trusted source ... validity with respect to the specific data authenticated by the source -- even without having access ... practical system for proving arbitrary computations over authenticated data in a privacy-preserving manner. ADSNARK...