Results 41 to 50 of about 10,790,774 (280)

Cryptanalysis of “MAKE”

open access: yesJournal of Mathematical Cryptology, 2022
Rahman and Shpilrain proposed a Diffie–Hellman style key exchange based on a semidirect product of n×nn\times n-matrices over a finite field. We show that, using public information, an adversary can recover the agreed upon secret key by solving a system ...
Brown Daniel R. L.   +2 more
doaj   +1 more source

LAKE-IoD: Lightweight Authenticated Key Exchange Protocol for the Internet of Drone Environment

open access: yesIEEE Access, 2020
A drone is an unmanned aerial vehicle, which is deployed in a particular Fly Zone (FZ), and used to collect crucial information from its surrounding environment to be transmitted to the server for further processing.
Muhammad Tanveer   +4 more
semanticscholar   +1 more source

Heisenberg Groups as Platform for the AAG key-exchange protocol [PDF]

open access: yes, 2014
Garber, Kahrobaei, and Lam studied polycyclic groups generated by number field as platform for the AAG key-exchange protocol. In this paper, we discuss the use of a different kind of polycyclic groups, Heisenberg groups, as a platform group for AAG by ...
Kahrobaei, Delaram, Lam, Ha T.
core   +1 more source

Tree Parity Machine Rekeying Architectures [PDF]

open access: yes, 2005
The necessity to secure the communication between hardware components in embedded systems becomes increasingly important with regard to the secrecy of data and particularly its commercial use. We suggest a low-cost (i.e.
Volkmer, Markus, Wallner, Sebastian
core   +5 more sources

Antibacterial Effect of Low-Concentration ZnO Nanoparticles on Sulfate-Reducing Bacteria under Visible Light

open access: yesNanomaterials, 2023
The effect of ZnO nanoparticles (ZnO NPs), with different concentrations in simulated water, on the activity of sulfate-reducing bacteria (SRB) and their adhesion behaviour on stainless-steel surfaces, with and without visible light treatment, were ...
Hua Yang   +7 more
doaj   +1 more source

Parallel Key Exchange

open access: yes, 2007
JUCS - Journal of Universal Computer Science Volume Nr.
Jeong,Ik, Lee,Dong
openaire   +2 more sources

Enhanced secure key exchange systems based on the Johnson-noise scheme [PDF]

open access: yes, 2013
We introduce seven new versions of the Kirchhoff-Law-Johnson-(like)-Noise (KLJN) classical physical secure key exchange scheme and a new transient protocol for practically-perfect security.
Kish, Laszlo B.
core   +3 more sources

Corrosion Behavior of 2205 DSS Base Metal and ER 2209 Weld Metal in a Deposited Ash/Water Suspension

open access: yesInternational Journal of Electrochemical Science, 2021
The corrosion behavior of 2205 duplex stainless steel (DSS) base metal (BM) and ER2209 weld metal (WM) in an ash/water suspension composed of deposited ash on the flue gas side of a low-temperature heat exchanger in a waste-to-energy plant and water was ...
Fang Ge   +6 more
doaj   +1 more source

Effect of different disinfection treatments on the adhesion and separation of biofilm on stainless steel surface

open access: yesWater Science and Technology, 2021
Attachment and separation of sulfate-reducing bacteria (SRB) biofilm on stainless steel (SS) in simulated cooling water with and without different sterilization treatments was investigated by calculation of surface energy, theoretical work of adhesion ...
Yi Zhang   +6 more
doaj   +1 more source

Location-enhanced authenticated key exchange [PDF]

open access: yes2016 International Conference on Computing, Networking and Communications (ICNC), 2016
We introduce LOCATHE (Location-Enhanced Authenticated Key Exchange), a generic protocol that pools location, user attributes, access policy and desired services into a multi-factor authentication, allowing two peers to establish a secure, encrypted session and perform mutual authentication with pre-shared keys, passwords and other authentication ...
Portnoi, Marcos, Shen, Chien-Chung
openaire   +2 more sources

Home - About - Disclaimer - Privacy