Key distribution

In symmetric key cryptography, both parties must possess a secret key which they must exchange prior to using any encryption. Distribution of secret… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1966-2018
05010015019662018

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2004
Highly Cited
2004
Secure communications in wireless sensor networks operating under adversarial conditions require providing pairwise (symmetric… (More)
  • figure 1
  • table I
  • table II
  • table III
  • table IV
Is this relevant?
Highly Cited
2004
Highly Cited
2004
We present the first known implementation of elliptic curve cryptography over F/sub 2p/ for sensor networks based on the 8-bit, 7… (More)
  • table I
  • figure 1
  • table II
  • table III
  • figure 2
Is this relevant?
Highly Cited
2003
Highly Cited
2003
We present a practical interactive conference key distribution system based on public keys, which is ‘proven’ secure provided the… (More)
Is this relevant?
Highly Cited
1996
Highly Cited
1996
Ever since a-party Diffie-Hellman key exchange was first proposed in 1976, there have been efforts to extend its simplicity and… (More)
  • figure 1
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
1995
Highly Cited
1995
  • Phillip RogawayyAbstractWe
  • 1995
We study session key distribution in the three-party setting of Needham and Schroeder. (This is the trust model assumed by the… (More)
Is this relevant?
Highly Cited
1993
Highly Cited
1993
Entity authentication and key distribution are central cryptographic problems in distributed computing|but up until now, they… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 5
Is this relevant?
Highly Cited
1992
Highly Cited
1992
In this paper we analyze perfectly secure key distribution schemes for dynamic conferences. In this setting, any member of a… (More)
Is this relevant?
Highly Cited
1984
Highly Cited
1984
A new signature scheme is proposed, together with an implementation of the Diffie-Hellman key distribution scheme that achieves a… (More)
Is this relevant?
Highly Cited
1981
Highly Cited
1981
The distribution of keys in a computer network using single key or public key encryption is discussed. We consider the… (More)
Is this relevant?
Highly Cited
1980
Highly Cited
1980
New Cryptographic protocols which take full advantage of the unique properties of public key cryptosystems are now evolving… (More)
  • figure I
Is this relevant?