نتایج جستجو برای: Key Agreement Protocol

تعداد نتایج: 929539  

Journal: :Information Technology Journal 2007

Journal: :Information Technology Journal 2007

Journal: :Computers & Mathematics with Applications 2003

Journal: :Datenschutz und Datensicherheit 2001
Stefan Pütz Roland Schmitz Tobias Martin

This contribution presents an overview of the security of the 3 generation mobile radio system UMTS as currently standardised by the 3 Generation Partnership Project 3GPP. We discuss the underlying principles and show to which extent the security of 2 generation systems as GSM is improved and enhanced by UMTS. The UMTS Authentication and Key Agreement protocol, the security algorithms deployed ...

2012
Joe-Kai Tsay Stig Fr. Mjølsnes

We report on a deficiency in the specifications of the Authentication and Key Agreement (AKA) protocols of the Universal Mobile Telecommunications System (UMTS) and Long-Term Evolution (LTE) as well as the specification of the GSM Subscriber Identity Authentication protocol, which are all maintained by the 3rd Generation Partnership Program (3GPP), an international consortium of telecommunicati...

Journal: :IACR Cryptology ePrint Archive 2017
Iris Anshel Derek Atkins Dorian Goldfeld Paul E. Gunnells

Public-key solutions based on number theory, including RSA, ECC, and Diffie-Hellman, are subject to various quantum attacks, which makes such solutions less attractive long term. Certain group theoretic constructs, however, show promise in providing quantum-resistant cryptographic primitives because of the infinite, non-cyclic, non-abelian nature of the underlying mathematics. This paper introd...

Journal: :IACR Cryptology ePrint Archive 2009
Björn Grohmann

A new 4-pass Key-Agreement-Protocol is presented. The security of the protocol mainly relies on the existence of a (polynomial-time computable) One-Way-Function and the supposed computational hardness of solving a specific system of equations.

Journal: :Advances in Mathematics of Communications 2021

Number theoretic public-key solutions, currently used in many applications worldwide, will be subject to various quantum attacks, making them less attractive for longer-term use. Certain group constructs are now showing promise providing quantum-resistant cryptographic primitives, and may provide suitable alternatives those looking address known attacks. In this pap...

Journal: :Research Journal of Information Technology 2013

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید