نتایج جستجو برای: authenticated

تعداد نتایج: 4119  

Journal: :IEICE Transactions on Information and Systems 2008

Journal: :ITC 2014
Han-Yu Lin

Conventional authenticated encryption (AE) schemes put emphasis on the single-user setting, which only allow one signer to produce an authenticated ciphertext such that merely the designated recipient is capable of recovering the message and verifying its corresponding signature. In the multi-user environments, e.g., organizational operations, several senior managers might cooperatively sign a ...

2004
Zhiguo Wan Shuhong Wang

In large-scale client-client communication environments, Password-Authenticated Key Exchange (PAKE) based on trusted server is very convenient in key management. For enhancing the efficiency and preventing various attacks, Wang and Mo proposed a three-PAKE protocol, Yoon and Yoo proposed a C2C-PAKE protocol. However, in this paper, we show that the Wang-Mo protocol and the Yoon-Yoo protocol exi...

2014
Lei Zhang Wenling Wu Yanfeng Wang Shengbao Wu Jian Zhang

2008
David Pointcheval Sébastien Zimmer

In order to increase the security for authenticated key exchange protocols, various authentication means can be used together. In this paper, we introduce a security model for multi-factor authenticated key exchange, which combines a password, a secure device, and biometric authentications. We thereafter present a scheme, that can be proven secure, in the random-oracle model.

Journal: :IACR Cryptology ePrint Archive 2005

This paper demonstrates operation of the authenticated encryption mode in VEST ciphers. All VEST ciphers operating in the authenticated encryption mode with infinite error propagation provide keyed message authentication at the same speed as their keystream generation, with negligible overhead and maintaining their security ratings.

Journal: :Chemical communications 2008
Jonathan D Selby Christian Schulten Andrew D Schwarz Andreas Stasch Eric Clot Cameron Jones Philip Mountford

The first structurally authenticated [2+2] cycloaddition products of any transition metal hydrazide complexes are reported; cycloaddition products of transition metal hydrazides with alkynes and heteroalkynes have been obtained for the first time; these are the first structurally authenticated cycloaddition products for any transition metal M=NNR(2) functional group.

2003
Hyoung-Mok Lee Eun-Kyung Ryu Kee-Won Kim Jae-Min Lee Kee-Young Yoo

In this paper, we propose a robust authenticated key agreement protocol in which two communication parties exchange a secret session key and authenticate each other. The protocol can be considered as an improvement of simple authenticated key agreement algorithm (SAKA). However, our protocol is more significant in that it addresses the problem of the off-line password guessing attack.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید