Spin dynamics in a Curie-switch
Ferromagnetic resonance properties of F$_1$/f/F$_2$/AF multilayers, where weakly ferromagnetic spacer f is sandwiched between strongly ferromagnetic layers F$_1$ and F$_2$, with F$_1$ being magnetically soft and F$_2$ - magnetically hard due to exchange ...
Dzhezherya, Yu. I. +5 more
core +1 more source
Verification Method of Key-Exchange Protocols With a Small Amount of Input Using Tamarin Prover [PDF]
Misato Nakabayashi, Yuki Okano
openalex +1 more source
Three-party password authenticated key agreement protocol with user anonymity based on lattice
With the rapid development of quantum theory and the existence of polynomial algorithm in quantum computation based on discrete logarithm problem and large integer decomposition problem,the security of the algorithm was seriously threatened.Therefore,two
Caifen WANG, Li CHEN
doaj
On a new fast public key cryptosystem [PDF]
This paper presents a new fast public key cryptosystem namely : a key exchange algorithm, a public key encryption algorithm and a digital signature algorithm, based on the difficulty to invert the following function : $F(x) =(a\times x)Mod(2^p)Div(2^q)$
Bouftass, Samir
core
Transport properties in Simplified Double Exchange model
Transport properties of the manganites by the double-exchange mechanism are considered. The system is modeled by a simplified double-exchange model, i.e.
Coery J. M. D. +5 more
core +1 more source
Verifier-based anonymous password-authenticated key exchange protocol in the standard model
Anonymous password-authenticated key exchange (APAKE) allows a client to authenticate herself and to establish a secure session key with a remote server via only a low-entropy password, while keeping her actual identity anonymous to the third party as ...
Qihui Zhang +4 more
doaj +1 more source
PDAKE: A Provably Secure PUF-Based Device Authenticated Key Exchange in Cloud Setting
In this paper, we study on how to construct an authenticated key exchange protocol in a device based authentication setting where an user who has a PUF-based device and its multi-factor authenticators desires to mutually authenticate a server. Generally,
Jin Wook Byun
doaj +1 more source
A secure and efficient authenticated key exchange scheme for smart grid. [PDF]
Xia Z, Liu T, Wang J, Chen S.
europepmc +1 more source
Unveiling the impact of exchange-correlation functionals on the description of key electronic properties of non-fullerene acceptors in organic photovoltaics [PDF]
Leandro R. Franco +2 more
openalex +1 more source
Deniable Internet Key Exchange [PDF]
In this work, we develop a family of non-malleable and deniable Diffie-Hellman key-exchange (DHKE) protocols, named deniable Internet keyexchange (DIKE). The newly developed DIKE protocols are of conceptual clarity, provide much remarkable privacy protection to protocol participants, and are of highly practical (online) efficiency.
Andrew C. Yao, Yunlei Zhao
openaire +1 more source

