نتایج جستجو برای: random key pre

تعداد نتایج: 1106434  

2007
Andrea Manganaro Mingyur Koblensky Michele Loreti

In recent years, amendments to IEEE standards for wireless networks added support for authentication algorithms based on the Extensible Authentication Protocol (EAP). Available solutions generally use digital certificates or pre-shared keys but the management of the resulting implementations is complex or unlikely to be scalable. In this paper we present EAP-SRP-256, an authentication method pr...

Journal: :ERCIM News 2011
Harry Buhrman Serge Fehr Christian Schaffner

In this work, we initiate the study of position-based cryptography in the quantum setting. The aim is to use the geographical position of a party as its only credential. This has interesting applications, e.g., it enables two military bases to communicate over insecure channels and without having any pre-shared key, with the guarantee that only parties within the bases learn the content of the ...

Journal: :IOP Conference Series: Materials Science and Engineering 2021

Journal: :International Journal of Applied Information Systems 2012

Journal: :International Journal of Computer Applications 2016

Journal: :IACR Cryptology ePrint Archive 2013
Elena Andreeva Andrey Bogdanov Yevgeniy Dodis Bart Mennink John P. Steinberger

The Advanced Encryption Standard (AES) is the most widely used block cipher. The high level structure of AES can be viewed as a (10-round) key-alternating cipher, where a t-round key-alternating cipher KAt consists of a small number t of fixed permutations Pi on n bits, separated by key addition: KAt(K,m) = kt ⊕ Pt(. . . k2 ⊕ P2(k1 ⊕ P1(k0 ⊕m)) . . . ), where (k0, . . . , kt) are obtained from ...

Journal: :J. Internet Serv. Inf. Secur. 2011
Sébastien Canard Julien Devigne Fabien Laguillaumie

A proxy re-encryption (PRE) scheme allows a designated proxy, that has beforehand received a so-called re-encryption key, to translate a ciphertext intended to one user to a ciphertext intended to another one. Traditionally, the re-encryption key is generated at the initiative of the initial receiver and ideally, no secret keys should be known to the proxy. Such scheme is said unidirectional if...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید