نتایج جستجو برای: random key pre

تعداد نتایج: 1106434  

2006
Jukka Valkonen

To achieve confidential communication channel between devices they must share a security association that defines the keys and algorithms used to secure the communication. In this paper, methods to create such security associations based on a pre-shared key used in WLAN and WiMedia’s UWB standards are discussed. The standards provide key agreement algorithms that operate on MAC layer based on a...

2006
Benoît Libert Jean-Jacques Quisquater Moti Yung

Intrusion-resilient signatures are key-evolving protocols that extend the concepts of forward-secure and key-insulated signatures. As in the latter schemes, time is divided into distinct periods where private keys are periodically updated while public keys remain fixed. Private keys are stored in both a user and a base; signature operations are performed by the user while the base is involved i...

2017
S. Sharmila Deva Selvi Arinjita Paul C. Pandu Rangan

Proxy re-encryption (PRE) is a cryptographic primitive introduced by Blaze, Bleumer and Strauss [4] to provide delegation of decryption rights. PRE allows re-encryption of a ciphertext intended for Alice (delegator) to a ciphertext for Bob (delegatee) via a semi-honest proxy, who should not learn anything about the underlying message. In 2003, Al-Riyami and Patterson introduced the notion of ce...

Journal: :IACR Cryptology ePrint Archive 2006
Matthew J. Campagna

The NIST codebook-based deterministic random bit generators are analyzed in the context of being indistinguishable from random. Upper and lower bounds based on the probability of distinguishing the output are proven. These bounds imply that the security of the designs are bounded by the codebook width, or more precisely on the property that the codebooks act like a random permutation, as oppose...

Journal: :CoRR 2008
Ashok Kumar Das Debasis Giri

Pairwise key establishment is one of the fundamental security services in sensor networks which enables sensor nodes in a sensor network to communicate securely with each other using cryptographic techniques. It is not feasible to apply traditional public key management techniques in resource-constrained sensor nodes, and also because the sensor nodes are vulnerable to physical capture. In this...

Journal: :IACR Cryptology ePrint Archive 2005
Yongge Wang

Several identity based and authenticated key agreement protocols have been proposed in recent years and all of them have been shown to be non-secure. It remains an open question to design secure identity based and authenticated key agreement protocols. In this paper, we propose an efficient identity-based and authenticated key agreement protocol IDAK using Weil/Tate pairing. A security model fo...

Journal: :IACR Cryptology ePrint Archive 2008
Daniel R. L. Brown

Bellare and Micciancio’s MuHASH applies a pre-existing hash function to map indexed message blocks into a secure group. The resulting hash is the product. Bellare and Micciancio proved, in the random oracle model, that MuHASH is collision-resistant if the group’s discrete logarithm problem is infeasible. MuHASH, however, relies on a pre-existing hash being collision resistant. In this paper, we...

Journal: :IACR Cryptology ePrint Archive 2008
Sunder Lal Prashant Kushwah

Here we propose an identity based signcryption scheme in the multi-PKG environment where sender and receiver receive public key from different PKG. We also define security models for our scheme and give security proofs in random oracle model.

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه ارومیه - دانشکده ادبیات 1391

this study investigated the effects of three kinds of gloss conditions, that is traditional non-call marginal gloss, audio gloss, and extended audio gloss, on reading comprehension and vocabulary gain of iranian upper- intermediate efl learners. to this end, three experimental and one control groups, each comprising 15 participants, took part in the current study. in order to ensure that the pa...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تبریز - دانشکده ادبیات و زبانهای خارجی 1393

abstract listening is a key and main tool in second language skill and its development is of prime concern to teachers and learners. furthermore, the application of technology in language classrooms has become more commonplace in the last fifty years. computer and the internet have made foreign language materials easy to access and use. so, the present study is an attempt to examine the effec...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید