Results 91 to 100 of about 10,790,774 (280)

Spin dynamics in a Curie-switch

open access: yes, 2015
Ferromagnetic resonance properties of F$_1$/f/F$_2$/AF multilayers, where weakly ferromagnetic spacer f is sandwiched between strongly ferromagnetic layers F$_1$ and F$_2$, with F$_1$ being magnetically soft and F$_2$ - magnetically hard due to exchange ...
Dzhezherya, Yu. I.   +5 more
core   +1 more source

Three-party password authenticated key agreement protocol with user anonymity based on lattice

open access: yesTongxin xuebao, 2018
With the rapid development of quantum theory and the existence of polynomial algorithm in quantum computation based on discrete logarithm problem and large integer decomposition problem,the security of the algorithm was seriously threatened.Therefore,two
Caifen WANG, Li CHEN
doaj  

On a new fast public key cryptosystem [PDF]

open access: yes, 2015
This paper presents a new fast public key cryptosystem namely : a key exchange algorithm, a public key encryption algorithm and a digital signature algorithm, based on the difficulty to invert the following function : $F(x) =(a\times x)Mod(2^p)Div(2^q)$
Bouftass, Samir
core  

Transport properties in Simplified Double Exchange model

open access: yes, 2003
Transport properties of the manganites by the double-exchange mechanism are considered. The system is modeled by a simplified double-exchange model, i.e.
Coery J. M. D.   +5 more
core   +1 more source

Verifier-based anonymous password-authenticated key exchange protocol in the standard model

open access: yesMathematical Biosciences and Engineering, 2019
Anonymous password-authenticated key exchange (APAKE) allows a client to authenticate herself and to establish a secure session key with a remote server via only a low-entropy password, while keeping her actual identity anonymous to the third party as ...
Qihui Zhang   +4 more
doaj   +1 more source

PDAKE: A Provably Secure PUF-Based Device Authenticated Key Exchange in Cloud Setting

open access: yesIEEE Access, 2019
In this paper, we study on how to construct an authenticated key exchange protocol in a device based authentication setting where an user who has a PUF-based device and its multi-factor authenticators desires to mutually authenticate a server. Generally,
Jin Wook Byun
doaj   +1 more source

Deniable Internet Key Exchange [PDF]

open access: yes, 2010
In this work, we develop a family of non-malleable and deniable Diffie-Hellman key-exchange (DHKE) protocols, named deniable Internet keyexchange (DIKE). The newly developed DIKE protocols are of conceptual clarity, provide much remarkable privacy protection to protocol participants, and are of highly practical (online) efficiency.
Andrew C. Yao, Yunlei Zhao
openaire   +1 more source

Home - About - Disclaimer - Privacy