搜索结果: 1-5 共查到“军事学 authenticated key establishment”相关记录5条 . 查询时间(0.078 秒)
An Isogeny-Based Password-Authenticated Key Establishment Protocol
isogeny-based cryptography password-authenticated key establishment
2018/11/13
Password authenticated key establishment (PAKE) is a cryptographic primitive that allows two parties who share a low-entropy secret (a password) to securely establish cryptographic keys in the absence...
Modeling Quantum-Safe Authenticated Key Establishment, and an Isogeny-Based Protocol
Post-quantum cryptography isogeny-based cryptography authenticated key establishment
2018/3/26
We propose a security model for authenticated key establishment in the quantum setting. Our model is the first for authenticated key establishment that allows for quantum superpositions of queries. Th...
One-Pass Authenticated Key Establishment Protocol on Bilinear Pairings for Wireless Sensor Networks
Key establishment bilinear pairings Session key
2016/1/26
The article proposes one-pass authenticated key establishment protocol
in random oracles for Wireless Sensor Networks. Security of the protocol relies on
Computational Diffie-Hellman Problem on Bili...
Weaknesses of the Boyd-Mao Deniable Authenticated key Establishment for Internet Protocols
deniable authenticated key establishment Internet Key Exchange (IKE) key-Compromise
2009/3/19
In 2003, Boyd and Mao proposed two deniable authenticated key establishment
protocols using elliptic curve pairings for Internet protocols, one is based on
Diffie-Hellman key exchange and the other ...
Secure Deniable Authenticated Key Establishment for Internet Protocols
Authenticated Key Establishment Internet Protocols
2008/9/1
In 2003, Boyd et al. have proposed two deniable
authenticated key establishment protocols for Internet
Key Exchange (IKE). However, both schemes have
been broken by Chou et al. in 2005 due to their...