نتایج جستجو برای: key exchange
تعداد نتایج: 727500 فیلتر نتایج به سال:
abstract global financial crisis has created too many problems in relations among governments. among these problems, the issue of global monetary management, more than every time in the past four decades, has been moved in the center of international economic attentions. a problem which is specially known with the monetary hostility between united states and public republic of china. where ar...
type text or a website address or translate a document. abstract liquidity is considered the most important aspect of the development of stock markets. the main objective of this study was to evaluate the effect of the quality of financial information provided to replace its financial statements nmvdh and shrkt hayy that the liquidity of the shares on the tehran stock exchange is between the ...
We provide the first description of and security model for authenticated key exchange protocols with predicate-based authentication. In addition to the standard goal of session key security, our security model also provides for credential privacy: a participating party learns nothing more about the other party’s credentials than whether they satisfy the given predicate. Our model also encompass...
In ICA3PP 2009, Xinglan Zhang proposed two one-round authenticated key exchange protocols and proved their security in the standard model. In this paper, we analyze these two protocols and find that both of them exist some flaws.
Recently, Coron presented an attack of GGH15 multilinear maps, which breaks the multipartite Diffie-Hellman key exchange protocol based on GGH15. In this paper, we describe a variation of GGH15, which seems to thwart known attacks.
General cryptographic schemes are presented where keys can be one-time or ephemeral. Processes for key exchange are derived. Public key cryptographic schemes based on the new systems are established. Authentication and signature schemes are easy to implement. The schemes may be integrated with error-correcting coding schemes so that encryption/coding and decryption/decoding may be done simultan...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید