Vintage Bit Cryptography

This may be a highly controversial talk, because this is an area where things are periodically rediscovered. But in the process of reinventing it, I think we've found a few interesting protocol issues, and a few interesting technological issues, which make it worth revisiting.

[1]  B. Wu,et al.  Secure communications over a public fiber-optical network , 2006, 2006 Conference on Lasers and Electro-Optics and 2006 Quantum Electronics and Laser Science Conference.

[2]  Steven M. Bellovin,et al.  Augmented encrypted key exchange: a password-based protocol secure against dictionary attacks and password file compromise , 1993, CCS '93.

[3]  Steven M. Bellovin,et al.  Encrypted key exchange: password-based protocols secure against dictionary attacks , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.

[4]  Burton S. Kaliski Advances in Cryptology - CRYPTO '97 , 1997 .

[5]  Gilles Brassard,et al.  Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.

[6]  Chris J. Mitchell A Storage Complexity Based Analogue of Maurer Key Establishment Using Public Channels , 1995, IMACC.

[7]  Ralph C. Merkle,et al.  A Digital Signature Based on a Conventional Encryption Function , 1987, CRYPTO.

[8]  Bruce Christianson,et al.  Secure Sessions from Weak Secrets , 2003, Security Protocols Workshop.

[9]  Ueli Maurer Conditionally-perfect secrecy and a provably-secure randomized cipher , 2004, Journal of Cryptology.

[10]  Carl Pomerance,et al.  Advances in Cryptology — CRYPTO ’87 , 2000, Lecture Notes in Computer Science.

[11]  Ueli Maurer,et al.  Unconditional Security Against Memory-Bounded Adversaries , 1997, CRYPTO.

[12]  Bruce Christianson,et al.  Merkle Puzzles Revisited - Finding Matching Elements Between Lists , 2001, Security Protocols Workshop.

[13]  Colin Boyd,et al.  Cryptography and Coding , 1995, Lecture Notes in Computer Science.

[14]  A. Shields,et al.  Continuous operation of a one-way quantum key distribution system over installed telecom fibre. , 2005, Optics express.

[15]  Z. Yuan,et al.  Quantum key distribution over 122 km of standard telecom fiber , 2004, quant-ph/0412171.

[16]  Gene Tsudik,et al.  Experimenting with Server-Aided Signatures , 2002, NDSS.

[17]  Akio Yoshizawa,et al.  10.5 km Fiber-Optic Quantum Key Distribution at 1550 nm with a Key Rate of 45 kHz , 2004 .

[18]  Charalampos Manifavas,et al.  A new family of authentication protocols , 1998, OPSR.

[19]  Richard J. Hughes,et al.  Quantum key distribution over a 48 km optical fibre network , 1999, quant-ph/9904038.

[20]  Michael O. Rabin,et al.  Hyper-Encryption and Everlasting Security , 2002, STACS.