Using mm-Waves for Secret Key Establishment
نویسندگان
چکیده
منابع مشابه
Secret Key Establishment for Symmetric Encryption over Adhoc Networks
The adhoc environment is accessible to both legitimate network users and unfortunately to malicious attackers as well. Secure routing over mobile adhoc networks is hard to achieve because of dynamic topology, mobility of nodes, lack of centralized infrastructure and absence of a certification authority. When a new mobile node joins the network and it does not have any trust based relationship w...
متن کاملConference Key Establishment Using Polynomials
In 1992, Blundo et al. have proposed a non-interactive k-secure m-conference protocol based on an m-variate polynomial over a finite field Fp. The key distribution center (KDC) is responsible to pick a symmetric m-variate polynomial of degree k and generate shares for users. Each share is a symmetric polynomial involving m− 1 variables of degree k, and needs to store the coefficients of such a ...
متن کاملSecret Key Cryptography Using Graphics Cards
One frequently cited reason for the lack of wide deployment of cryptographic protocols is the (perceived) poor performance of the algorithms they employ and their impact on the rest of the system. Although high-performance dedicated cryptographic accelerator cards have been commercially available for some time, market penetration remains low. We take a different approach, seeking to exploit exi...
متن کاملCryptoGraphics: Secret Key Cryptography Using Graphics Cards
We investigate the feasibility of using Graphics Processing Units (GPUs) for cryptographic processing by exploiting the ability for GPUs to simultaneously process large quantities of pixels to offload symmetric key encryption from the main processor. We demonstrate the use of GPUs for applying the key stream when using stream ciphers. We investigate the use of GPUs for block ciphers, discuss op...
متن کاملExtensible Authentication Protocol Method for Shared-secret Authentication and Key Establishment (EAP-SAKE)
This RFC is not a candidate for any level of Internet Standard. The IETF disclaims any knowledge of the fitness of this RFC for any purpose and in particular notes that the decision to publish is not based on IETF review for such things as security, congestion control, or inappropriate interaction with deployed protocols. The RFC Editor has chosen to publish this document at its discretion. Rea...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Communications Letters
سال: 2019
ISSN: 1089-7798,1558-2558,2373-7891
DOI: 10.1109/lcomm.2019.2909918