نتایج جستجو برای: key exchange

تعداد نتایج: 727500  

2015
Shijun Zhao Qianying Zhang

The Trusted Platform Module (TPM) version 2.0 provides an authenticated key exchange functionality by a single key exchange primitive, which can be called to implement three key exchange protocols (denoted as two-phase key exchange protocols in TPM 2.0): the Full Unified Model, the MQV, and the SM2 key exchange protocols. However, some vulnerabilities have been found in all of these protocols. ...

Journal: :I. J. Network Security 2013
H. K. Pathak Manju Sanghi

In 2005, Abdalla and Pointcheval suggested a new variation of the computational DH assumption called chosen based computational Diffie Hellman (CCDH) and presented SPAKE-1 and SPAKE-2 simple password based authenticated key exchange protocols. Since then several three party password authenticated key agreement protocols have been proposed based on CCDH assumption but most of them broken. In thi...

2007
Keith M. Martin

One of the most important processes involved in securing a cryptographic system is establishing the keys on which the system will rely. In this article we review the significant contribution of combinatorial mathematics to the development of the theory of cryptographic key establishment. We will describe relevant applications, review current research and, where appropriate, identify areas where...

Journal: :IET Information Security 2008
Emmanuel Bresson Mark Manulis

In a group key exchange protocol, the resulting group key should be computed by all participants such that none of them can gain any advantage concerning the protocol’s output: misbehaving participants might have personal advantage in influencing the final value of the key. In fact, the absence of trust relationship is the main feature of group key exchange (when compared to group key transport...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت معلم تهران - دانشکده علوم 1370

determination of uranium in natural water and complex solutions using ion exchange chromatography: a combined procedure using ion exchange chromatography and uv-vis spectrophotometry techniques has been developed to measure uranum in natural water and complex solutions. after conditicing , one hundred milli liters of sample solutions have been passed through an ion exchange column,pachked with ...

2008
Colin Boyd Yvonne Cliff Juan Manuel González Nieto Kenneth G. Paterson

We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of it to the ID-based setting. It is shown how KEMs can be used in a generic way to obtain two different protocol designs with progressively stronger security guarantees. A detailed analysis of the performance of the pr...

2008
Rakesh Chandra Gangwar

Now-a-days Internet has become the common media of communication. Many group communication application such as pay-per-view, stock quote distribution, voiceand video-conferencing, white-boards, distributed simulations, and replicated servers of all types, etc can easily be conducted on the Internet. For conducting such applications, group key is often needed, which can be established by group k...

Journal: :IACR Cryptology ePrint Archive 2011
Simon R. Blackburn Carlos Cid Ciaran Mullan

We cryptanalyse a matrix-based key transport protocol due to Baumslag, Camps, Fine, Rosenberger and Xu from 2006. We also cryptanalyse two recently proposed matrix-based key agreement protocols, due to Habeeb, Kahrobaei and Shpilrain, and due to Romanczuk and Ustimenko.

2016
Nazmul Islam M. A. Moyeen

The ample use of Wireless Sensor Network demands highly effective security mechanism for its sound operation in any hostile environment. The security of encrypted information greatly dependents on the rigidity of underlying Key Management techniques. Hence, key management becomes the most significant issue in case of security of Wireless Sensor Networks. The purpose of this paper is to assess m...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید