Results 21 to 30 of about 3,103,043 (192)
Rahman and Shpilrain proposed a Diffie–Hellman style key exchange based on a semidirect product of n×nn\times n-matrices over a finite field. We show that, using public information, an adversary can recover the agreed upon secret key by solving a system ...
Brown Daniel R. L. +2 more
doaj +1 more source
Heisenberg Groups as Platform for the AAG key-exchange protocol [PDF]
Garber, Kahrobaei, and Lam studied polycyclic groups generated by number field as platform for the AAG key-exchange protocol. In this paper, we discuss the use of a different kind of polycyclic groups, Heisenberg groups, as a platform group for AAG by ...
Kahrobaei, Delaram, Lam, Ha T.
core +1 more source
Tree Parity Machine Rekeying Architectures [PDF]
The necessity to secure the communication between hardware components in embedded systems becomes increasingly important with regard to the secrecy of data and particularly its commercial use. We suggest a low-cost (i.e.
Volkmer, Markus, Wallner, Sebastian
core +5 more sources
With the increasing use of mobile devices, a secure communication and key exchange become the significant security issues in mobile environments. However, because of open network environments, mobile user can be vulnerable to various attacks.
Kisung Park +3 more
doaj +1 more source
The effect of ZnO nanoparticles (ZnO NPs), with different concentrations in simulated water, on the activity of sulfate-reducing bacteria (SRB) and their adhesion behaviour on stainless-steel surfaces, with and without visible light treatment, were ...
Hua Yang +7 more
doaj +1 more source
Isogeny-based post-quantum key exchange protocols [PDF]
The goal of this project is to understand and analyze the supersingular isogeny Diffie Hellman (SIDH), a post-quantum key exchange protocol which security lies on the isogeny-finding problem between supersingular elliptic curves.
Sorinas Capdevila, Ernest
core
A Diffie-Hellman Key Exchange Using Matrices Over Non Commutative Rings [PDF]
We consider a key exchange procedure whose security is based on the difficulty of computing discrete logarithms in a group, and where exponentiation is hidden by a conjugation. We give a platform-dependent cryptanalysis of this protocol. Finally, to take
Eftekhari, Mohammad
core +3 more sources
JUCS - Journal of Universal Computer Science Volume Nr.
Jeong,Ik, Lee,Dong
openaire +2 more sources
Attachment and separation of sulfate-reducing bacteria (SRB) biofilm on stainless steel (SS) in simulated cooling water with and without different sterilization treatments was investigated by calculation of surface energy, theoretical work of adhesion ...
Yi Zhang +6 more
doaj +1 more source
3.3 Gigahertz Clocked Quantum Key Distribution System [PDF]
A fibre-based quantum key distribution system operating up to a clock frequency of 3.3GHz is presented. The system demonstrates significantly increased key exchange rate potential and operates at a wavelength of 850nm.Comment: Presented at ECOC 05 ...
Buller, Gerald S. +6 more
core +2 more sources

