نتایج جستجو برای: authenticated

تعداد نتایج: 4119  

2005
J. Black

Often when two parties communicate over a network, they have two main security goals: privacy and authentication. In fact, there is compelling evidence that one should never use encryption without also providing authentication [8, 14]. Many solutions for the privacy and authentication problems have existed for decades, and the traditional approach to solving both simultaneously has been to comb...

Journal: :Computers & Electrical Engineering 2007
Shiang-Feng Tzeng Yuan-Liang Tang Min-Shiang Hwang

In this article, we present an authenticated encryption scheme with message linkages used to deliver a large message. To protect the receiver’s benefit, the receiver can easily convert the signature into an ordinary one that can be verified by anyone. Several feasible attacks will be discussed, and the security analysis will prove that none of them can successfully break the proposed scheme. 20...

2007
Yongdong Wu Feng Bao Robert H. Deng Marc Mouffron Frederic Rousseau

The Trusted Computing Group (TCG) defines the specifications for the Trusted Platform Module (TPM) and corresponding trust mechanisms that allow a TPM-enabled platform to run only authenticated software. For example, the operating system (OS) can use the facilities provided by the TPM to authenticate a Digital Rights Management (DRM) application before allowing it to run. However TCG does not p...

2010
Charalampos Papamanthou Roberto Tamassia Nikos Triandopoulos

Cloud computing and cloud storage are becoming increasingly prevalent. In this paradigm, clients outsource their data and computations to third-party service providers. Data integrity in the cloud therefore becomes an important factor for the functionality of these web services. Authenticated data structures, implemented with various cryptographic primitives, have been widely studied as a means...

Journal: :IACR Cryptology ePrint Archive 2004
Muxiang Zhang

We investigate eÆcient protocols for password-authenticated key exchange based on the RSA public-key cryptosystem. To date, most of the published protocols for password-authenticated key exchange were based on DiÆe-Hellman key exchange. It seems diÆcult to design eÆcient password-authenticated key exchange protocols using RSA and other public-key cryptographic techniques. In fact, many of the p...

Journal: :IACR Cryptology ePrint Archive 2004
Michel Abdalla Pierre-Alain Fouque David Pointcheval

Password-based authenticated key exchange are protocols which are designed to be secure even when the secret key or password shared between two users is drawn from a small set of values. Due to the low entropy of passwords, such protocols are always subject to online guessing attacks. In these attacks, the adversary may succeed with non-negligible probability by guessing the password shared bet...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید