Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Key distribution

In symmetric key cryptography, both parties must possess a secret key which they must exchange prior to using any encryption. Distribution of secret… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
When elementary quantum systems, such as polarized photons, are used to transmit digital information, the uncertainty principle… Expand
Is this relevant?
Highly Cited
2004
Highly Cited
2004
We present the first known implementation of elliptic curve cryptography over F/sub 2p/ for sensor networks based on the 8-bit, 7… Expand
  • table I
  • figure 1
  • table II
  • table III
  • figure 2
Is this relevant?
Highly Cited
1998
Highly Cited
1998
A key distribution scheme for dynamic conferences is a method by which initially an (off-line) trusted server distributes private… Expand
Is this relevant?
Highly Cited
1996
Highly Cited
1996
Ever since a-party Diffie-Hellman key exchange was first proposed in 1976, there have been efforts to extend its simplicity and… Expand
  • figure 1
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
1995
Highly Cited
1995
We study session key distribution in the three-party setting of Needham and Schroeder. (This is the trust model assumed by the… Expand
  • figure 1
Is this relevant?
Highly Cited
1994
Highly Cited
1994
We present practical conference key distribution systems based on public keys, which authenticate the users and which are ‘proven… Expand
Is this relevant?
Highly Cited
1993
Highly Cited
1993
We provide the first formal treatment of entity authentication and authenticated key distribution appropriate to the distributed… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
1992
Highly Cited
1992
A key distribution scheme for dynamic conferences is a method by which initially an (off-line) trusted server distributes private… Expand
Is this relevant?
Highly Cited
1982
Highly Cited
1982
Encryption is used in a communication system to safeguard information in the transmitted messages from anyone other than the… Expand
Is this relevant?
Highly Cited
1981
Highly Cited
1981
The distribution of keys in a computer network using single key or public key encryption is discussed. We consider the… Expand
Is this relevant?