Results 91 to 100 of about 3,103,043 (192)

Living with the Fear of Floating: An Optimal Policy Perspective [PDF]

open access: yes
As documented in recent studies, developing countries (classified by the IMF as floaters or managed floaters) are extremely reluctant to allow for large nominal exchange rate fluctuations.
Amartya Lahiri, Carlos A. Vegh
core  

Exchange Rate Pass-Through in the Euro Area [PDF]

open access: yes
Exchange rate pass-through in a set of euro area prices along the pricing chain is examined in this paper. First, a vector autoregression (VAR) approach is used to analyze the joint time-series behavior of the euro exchange rate and a system of area-wide
Hamid Faruqee
core  

Quantum Diffie–Hellman key exchange

open access: yesAPL Quantum
The Diffie–Hellman key exchange plays a crucial role in conventional cryptography, as it allows two legitimate users to establish a common, usually ephemeral, secret key. Its security relies on the discrete-logarithm problem, which is considered to be a mathematical one-way function, while the final key is formed by random independent actions of the ...
openaire   +3 more sources

An Efficient Method for Estimating Capability Curve of Virtual Power Plant

open access: yesCSEE Journal of Power and Energy Systems, 2022
Zhenfei Tan   +3 more
doaj   +1 more source

Probabilistic encryption key exchange

open access: yesElectronics Letters, 1995
A novel secret key exchange algorithm is proposed. It is based on the properties of the Blum Blum and Shum pseudo-random number generator (the 'x/sup 2/ modN' generator), and on partial disclosure of the secret seed for this generator. The security and other features of the proposed cryptosystem are discussed.
openaire   +1 more source

Deniable Public-Key Authenticated Quantum Key Exchange

open access: yes
In this work, we explore the notion of deniability in public-key authenticated quantum key exchange (QKE), which allows two parties to establish a shared secret key without leaving any evidence that would bind a session to either party. The deniability property is expressed in terms of being able to simulate the transcripts of a protocol.
Jeroen van Wier   +2 more
openaire   +2 more sources

Efficient anonymous password-based authenticated key exchange scheme

open access: yesTongxin xuebao, 2009
Password-based key exchange schemes was designed to provide entities communicating over a public network,and only sharing a(short) password with a session key(e.g.,the key was used for data confidentiality and/or integrity).There has been much interest ...
TAN Shi-chong   +3 more
doaj  

Strongly Anonymous Ratcheted Key Exchange

open access: yes, 2022
Dowling, B.   +3 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy