搜索结果: 46-60 共查到“军事学 key agreement”相关记录150条 . 查询时间(0.087 秒)
An efficient certificateless authenticated key agreement protocol without bilinear pairings
Certificateless cryptography Authenticated key agreement
2011/7/25
Certificateless public key cryptography simplifies the complex certificate management in the traditional public key cryptography and resolves the key escrow problem in identity-based cryptography.
Cryptanalysis of a key agreement protocol based on chaotic Hash
Chaos Hash function Key agreement Chebyshev
2011/7/25
With the rapid development of theory and application of chaos, more and more researchers are focusing on chaos based cryptosystems.
Security flaws in a biometrics-based multi-server authentication with key agreement scheme
Authentication Key agreement Masquerade attack Privileged insider attack Elliptic curve cryptosystem Smart card
2012/3/27
Recently, Yoon et al. proposed an efficient biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem (ECC) for multi-server communication e...
Cryptanalysis of a key agreement protocol based on chaotic Hash
cryptographic protocols / Chaos Hash function Key agreement Chebyshev Password guessing attack
2012/3/27
With the rapid development of theory and application of chaos, more and more researchers are focusing on chaos based cryptosystems. Recently, Guo et al.’s [X. Guo, J. Zhang, Secure group key agreement...
Breaking a certificateless key agreement protocol withour bilinear pairing
public-key cryptography Certificateless cryptography Authenticated key agreement Provable security Bilinear pairings Elliptic curve
2011/6/9
Certificateless public key cryptography simplifies the complex certificate management in the traditional public key cryptography and resolves the key escrow problem in identity-based cryptography. Man...
Key agreement based on homomorphisms of algebraic structures
cryptographic protocols / public-key cryptography key exchange session key agreement algebraic system universal algebra
2012/3/28
We give a generalization of the Diffie-Hellman key agreement scheme that is based on the hardness of computing homomorphic images from an algebra to another. We formulate computational and decision ve...
An efficient certificateless two-party authenticated key agreement scheme from pairings
Certificateless cryptography Authenticated key agreement Provable
2011/3/11
Key agreement (KA) allows two or more users to negotiate a secret
session key among them over an open network. Authenticated key agreement
(AKA) is a KA protocol enhanced to prevent active attacks. ...
An efficient certificateless two-party authenticated key agreement scheme from pairings
Certificateless cryptography Authenticated key agreement Provable security Bilinear pairings Elliptic curve
2012/3/29
Key agreement (KA) allows two or more users to negotiate a secret session key among them over an open network. Authenticated key agreement (AKA) is a KA protocol enhanced to prevent active attacks. AK...
Cryptanalysis and Security Enhancement of an Advanced Authentication Scheme using Smart Cards, and a Key Agreement Scheme for Two-Party Communication
smart cards cryptanalysis key management
2011/2/23
In this work we consider two protocols for performing cryptanalysis and security enhancement. The first one by Song, is a password authentication scheme based on smart cards. We note that this scheme ...
Private Identification, Authentication and Key Agreement Protocol with Security Mode Setup
applications
2012/3/29
Identification, authentication and key agreement protocol of UMTS networks with security mode setup has some weaknesses in the case of mutual freshness of key agreement, DoS-attack resistance, and eff...
Private Identification, Authentication and Key Agreement Protocol with Security Mode Setup
Identification Authentication Key Agreement Privacy UMTS Mobile Network Security Protocol
2011/2/23
Identification, authentication and key agreement protocol of UMTS networks with security mode setup has some weaknesses in the case of mutual freshness of key agreement, DoS-attack resistance, and eff...
Weakness of two ID-based remote mutual authentication with key agreement protocols for mobile devices
ID-based Mutual authentication Key agreement Elliptic curve Cryptosystem
2010/11/26
Recently, Yoon et al. and Wu proposed two improved remote mutual authentication and key agreement schemes for mobile devices on elliptic curve cryptosystem. In this paper, we show that Yoon et al.’s p...
Key Agreement Protocols Based on Multivariate Polynomials over Fq
key agreement protocol multivariate polynomials Grö bner bases NP complete problems finite field
2010/10/14
In this paper we propose new key agreement protocols based on multivariate polynomials over finite field Fq. We concretely generate the multivariate polynomial F(X)\in Fq[x1,..,xn] such that F(X)=\sum...
Stronger Security Model of Group Key Agreement
Group key agreement Ephemeral key leakage attack Security model Provable security
2010/9/26
In PKC 2009, Gorantla, Boyd and Gonz\'{a}lez Nieto presented a nice result on modelling security for group key agreement (GKA) protocols. They proposed a novel security model (GBG model) that better s...
Two Attacks on Dutta’s Dynamic Group Key Agreement Protocol
attack group key agreement dynamic impersonation
2010/9/9
Ratna Dutta and Rana Barua proposed a dynamic group key agreement protocol with constant round referred to as DGKA protocol. They claimed that the DGKA protocol is dynamic, efficient and provably secu...