搜索结果: 136-150 共查到“军事学 key agreement”相关记录150条 . 查询时间(0.154 秒)
Revisiting an efficient elliptic curve key agreement protocol
key compromise impersonation key agreement protocol elliptic curves
2008/9/11
A recent paper by Wang et al. has revealed a vulnerability in the
ECKE-1 key agreement protocol. In particular, contrary to the author’s claims,
protocol ECKE-1 is shown to be susceptible to a key-c...
Revisiting an efficient elliptic curve key agreement protocol
key compromise impersonation key agreement protocol elliptic curves
2008/9/10
A recent paper by Wang et al. has revealed a vulnerability in the
ECKE-1 key agreement protocol. In particular, contrary to the author’s claims,
protocol ECKE-1 is shown to be susceptible to a key-c...
A Zero-Knowledge Identification and Key Agreement Protocol
mutual identification key agreement zero-knowledge
2008/9/5
In this paper, we propose a zero-knowledge authenticated key agreement protocol with key
confirmation (AKC) in asymmetric setting. The protocol has several desirable security attributes like some cla...
Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS
efficient key agreement protocol (H)MQV NAXOS
2008/9/4
LaMacchia, Lauter and Mityagin recently presented a strong security
definition for authenticated key agreement strengthening the well-known
Canetti-Krawczyk definition. They also described a protoco...
An Enhanced One-round Pairing-based Tripartite Authenticated Key Agreement Protocol
One-round Tripartite Authenticated Key Agreement Protocol
2008/9/3
A tripartite authenticated key agreement protocol is generally
designed to accommodate the need of three specific entities in communicating
over an open network with a shared secret key, which is us...
Provable password-based tripartite key agreement protocol
Password Tripartite key agreement Authentication Pairing
2008/8/28
A password-based tripartite key agreement protocol is presented in this paper. The three entities involved in this protocol can negotiate a common session key via a shared password over insecure netwo...
An Improved One-Round ID-Based Tripartite Authenticated Key Agreement Protocol
One-Round ID-Based Tripartite Authenticated Key Agreement Protocol
2008/8/27
A tripartite authenticated key agreement protocol is gen-
erally designed to accommodate the need of three specic entities in
communicating over an open network with a shared secret key, which
is ...
Bilateral Unknown Key-Share Attacks in Key Agreement Protocols
authenticated key agreement unknown key-share resilience bilateral unknown key-share resilienc
2008/8/25
Unknown Key-Share (UKS) resilience is a basic security attribute
in authenticated key agreement protocols, whereby two entities A and
B should not be able to be coerced into sharing a key between th...
A New Provably Secure Authentication and Key Agreement Protocol for SIP Using ECC
SIP NAKE protocol CK security model Provable security
2008/8/22
SIP is playing a key role in the IP based services and has been chosen as the protocol for multimedia application in 3G mobile networks by the Third-Generation Partnership Project. The authentication ...
A New Provably Secure Authentication and Key Agreement Mechanism for SIP Using Certificateless Public-key Cryptography
SIP certificateless public-key cryptography authentication key agreement
2008/8/22
The session initiation protocol (SIP) is considered as the dominant signaling protocol for calls over the internet. However, SIP authentication typically uses HTTP digest authentication, which is vuln...
Perfect Forward Secure Identity-Based Authenticated Key Agreement Protocol in the Escrow Mode
Authenticated key agreement Perfect forward secrecy Bilinear pairing
2008/5/30
There are several essential features in key agreement protocols such
as key escrow (essential when confidentiality, audit trail and legal interception
are required) and perfect forward secrecy (i.e....
Cryptanalysis on Improved One-round Lin-Li’s Tripartite Key Agreement Protocol
Cryptanalysis on Improved One-round Tripartite Key Agreement Protocol
2008/5/23
A tripartite authenticated key agreement protocol is
designed for three entities to communicate securely over an
open network particularly with a shared key. Recently, we
have improved a one-round ...
Cryptanalytic Flaws in Oh et al.’s ID-Based Authenticated Key Agreement Protocol
Cryptanalytic Flaws ID-Based Authenticated Key Protocol
2008/5/23
A key agreement protocol is designed for two or more
entities to agree upon a shared secret key, which is used
to preserve confidentiality and data integrity over an open
network. In 2007, Oh et al...
Multiparty Key Agreement using Bilinear Map
Multiparty Key Agreement Authentication Bilinear Map Weil Pairing
2008/5/21
A key agreement protocol is a cryptographical primitive which allows participants to share a common secret key via insecure channel. In particular, a multiparty key agreement protocol is a key agreeme...
Public Key Cryptography For The Financial Services Industry:Key Agreement and KeyTransport
Public Key Cryptography Financial Services Industry Key Agreement KeyTransport 公钥密码标准
2008/5/19
Notice -- This document is a draft document. It has not yet been processed through the consensus
procedures of X9 and ANSI.
Many changes which may greatly affect its contents can occur before this d...