نتایج جستجو برای: random key pre
تعداد نتایج: 1106434 فیلتر نتایج به سال:
To achieve confidential communication channel between devices they must share a security association that defines the keys and algorithms used to secure the communication. In this paper, methods to create such security associations based on a pre-shared key used in WLAN and WiMedia’s UWB standards are discussed. The standards provide key agreement algorithms that operate on MAC layer based on a...
Intrusion-resilient signatures are key-evolving protocols that extend the concepts of forward-secure and key-insulated signatures. As in the latter schemes, time is divided into distinct periods where private keys are periodically updated while public keys remain fixed. Private keys are stored in both a user and a base; signature operations are performed by the user while the base is involved i...
Proxy re-encryption (PRE) is a cryptographic primitive introduced by Blaze, Bleumer and Strauss [4] to provide delegation of decryption rights. PRE allows re-encryption of a ciphertext intended for Alice (delegator) to a ciphertext for Bob (delegatee) via a semi-honest proxy, who should not learn anything about the underlying message. In 2003, Al-Riyami and Patterson introduced the notion of ce...
The NIST codebook-based deterministic random bit generators are analyzed in the context of being indistinguishable from random. Upper and lower bounds based on the probability of distinguishing the output are proven. These bounds imply that the security of the designs are bounded by the codebook width, or more precisely on the property that the codebooks act like a random permutation, as oppose...
Pairwise key establishment is one of the fundamental security services in sensor networks which enables sensor nodes in a sensor network to communicate securely with each other using cryptographic techniques. It is not feasible to apply traditional public key management techniques in resource-constrained sensor nodes, and also because the sensor nodes are vulnerable to physical capture. In this...
Several identity based and authenticated key agreement protocols have been proposed in recent years and all of them have been shown to be non-secure. It remains an open question to design secure identity based and authenticated key agreement protocols. In this paper, we propose an efficient identity-based and authenticated key agreement protocol IDAK using Weil/Tate pairing. A security model fo...
Bellare and Micciancio’s MuHASH applies a pre-existing hash function to map indexed message blocks into a secure group. The resulting hash is the product. Bellare and Micciancio proved, in the random oracle model, that MuHASH is collision-resistant if the group’s discrete logarithm problem is infeasible. MuHASH, however, relies on a pre-existing hash being collision resistant. In this paper, we...
Here we propose an identity based signcryption scheme in the multi-PKG environment where sender and receiver receive public key from different PKG. We also define security models for our scheme and give security proofs in random oracle model.
this study investigated the effects of three kinds of gloss conditions, that is traditional non-call marginal gloss, audio gloss, and extended audio gloss, on reading comprehension and vocabulary gain of iranian upper- intermediate efl learners. to this end, three experimental and one control groups, each comprising 15 participants, took part in the current study. in order to ensure that the pa...
abstract listening is a key and main tool in second language skill and its development is of prime concern to teachers and learners. furthermore, the application of technology in language classrooms has become more commonplace in the last fifty years. computer and the internet have made foreign language materials easy to access and use. so, the present study is an attempt to examine the effec...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید