Results 1 to 10 of about 2,989,875 (336)

On the Security of a PUF-Based Authentication and Key Exchange Protocol for IoT Devices [PDF]

open access: yesSensors, 2023
Recently, Roy et al. proposed a physically unclonable function (PUF)-based authentication and key exchange protocol for Internet of Things (IoT) devices.
Da-Zhi Sun, Yi-Na Gao, Yangguang Tian
doaj   +2 more sources

LPWAN Key Exchange: A Centralised Lightweight Approach [PDF]

open access: yesSensors, 2022
The Internet of Things (IoT) is one of the fastest emerging technologies in the industry. It includes diverse applications with different requirements to provide services to users.
Gaurav Pathak   +3 more
doaj   +2 more sources

Algorithms for Lightweight Key Exchange. [PDF]

open access: yesSensors (Basel), 2017
Public-key cryptography is too slow for general purpose encryption, with most applications limiting its use as much as possible. Some secure protocols, especially those that enable forward secrecy, make a much heavier use of public-key cryptography, increasing the demand for lightweight cryptosystems that can be implemented in low powered or mobile ...
Alvarez R   +3 more
europepmc   +6 more sources

Dynamic Group Authentication and Key Exchange Scheme Based on Threshold Secret Sharing for IoT Smart Metering Environments [PDF]

open access: yesSensors, 2018
The Internet of Things (IoT) environment is constantly evolving. Many IoT services have emerged, improving living conditions. Smart homes were among the first developments, and smart buildings, smart factories, and smart cities are attracting increasing ...
Dae-Hwi Lee, Im-Yeong Lee
doaj   +2 more sources

Oblivious Transfer based on Key Exchange [PDF]

open access: yesCryptologia, 2007
Key-exchange protocols have been overlooked as a possible means for implementing oblivious transfer (OT). In this paper we present a protocol for mutual exchange of secrets, 1-out-of-2 OT and coin flipping similar to Diffie-Hellman protocol using the ...
Abhishek Parakh   +3 more
core   +4 more sources

Key exchange with the help of a public ledger [PDF]

open access: yes, 2017
Blockchains and other public ledger structures promise a new way to create globally consistent event logs and other records. We make use of this consistency property to detect and prevent man-in-the-middle attacks in a key exchange such as Diffie-Hellman
A Shamir   +9 more
core   +3 more sources

Generic Security Proof of Quantum Key Exchange using Squeezed States [PDF]

open access: green, 2005
Recently, a Quantum Key Exchange protocol that uses squeezed states was presented by Gottesman and Preskill. In this paper we give a generic security proof for this protocol.
Poels, Karin   +2 more
core   +4 more sources

On Deniability in Quantum Key Exchange [PDF]

open access: bronze, 2002
We show that claims of "perfect security" for keys produced by quantum key exchange (QKE) are limited to "privacy" and "integrity." Unlike a one-time pad, QKE does not necessarily enable Sender and Receiver to pretend later to have established a different key.
Donald Beaver
openaire   +3 more sources

Parallel Key Exchange [PDF]

open access: green, 2007
JUCS - Journal of Universal Computer Science Volume Nr.
Jeong,Ik, Lee,Dong
openaire   +2 more sources

New Cryptographic Primitive: Definition, Model and Construction of Ratched Key Exchange [PDF]

open access: yesJisuanji kexue, 2022
In the application of traditional cryptography,people always assume that the endpoints are secure and the adversary is on the communication channel.However,the prevalence of malware and system vulnerabilities makes endpoint compromise a se-rious and ...
FENG Deng-guo
doaj   +1 more source

Home - About - Disclaimer - Privacy