Results 51 to 60 of about 3,103,043 (192)
Design and analysis of group key exchange protocols [PDF]
A group key exchange (GKE) protocol allows a set of parties to agree upon a common secret session key over a public network. In this thesis, we focus on designing efficient GKE protocols using public key techniques and appropriately revising security ...
Gorantla, Malakondayya Choudary
core +1 more source
An active attack on a distributed Group Key Exchange system
In this work, we introduce an active attack on a Group Key Exchange protocol by Burmester and Desmedt. The attacker obtains a copy of the shared key, which is created in a collaborative manner with the legal users in a communication ...
Baouch, Mohamed +3 more
core +1 more source
Smooth Hash Proof System Based on the Learning With Errors Problem With Multi-Bit Key Output
Since hash proof system (HPS) can be utilized to build versatilely cryptographic schemes, the study on realizing this cryptographic primitive has been a very active research area. With the increasing concerns on the huge progress in quantum computing, it
Momeng Liu +3 more
doaj +1 more source
What kind of noise guarantees security for the Kirchhoff-Loop-Johnson-Noise key exchange? [PDF]
This article is a supplement to our recent one about the analysis of the noise properties in the Kirchhoff-Law-Johnson-Noise (KLJN) secure key exchange system [Gingl and Mingesz, PLOS ONE 9 (2014) e96109, doi:10.1371/journal.pone.0096109].
Gingl, Zoltan +2 more
core +2 more sources
Calcium sulfate scale is a typical deposit on the equipment pieces or pipes of an industrial water system. Scale inhibitors could obviously reduce the precipitation of calcium sulfate crystal.
Jian-Qiu Chen +4 more
doaj +1 more source
A new key exchange protocol based on the decomposition problem [PDF]
In this paper we present a new key establishment protocol based on the decomposition problem in non-commutative groups which is: given two elements $w, w_1$ of the platform group $G$ and two subgroups $A, B \subseteq G$ (not necessarily distinct), find ...
Shpilrain, Vladimir, Ushakov, Alexander
core +2 more sources
Public Key Exchange Using Matrices Over Group Rings [PDF]
We offer a public key exchange protocol in the spirit of Diffie-Hellman, but we use (small) matrices over a group ring of a (small) symmetric group as the platform.
Kahrobaei, Delaram +2 more
core +2 more sources
Survey of braid-based cryptography
The achievements of braid-based cryptography were surveyed: some recently developed cryptographic schemes were introduced, including key exchange protocols enciphering-deciphering and authentication schemes.
ZHU Ping1, WEN Qiao-yan2
doaj
Edge computing has played an important role in enabling 5G technology which supports a great number of connected narrow-band IoT devices. In an edge computing architecture enabled with global mobile network, edge or IoT devices are wirelessly connected ...
Chien-Lung Hsu +4 more
doaj +1 more source
CCS '24: Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications ...
Günther, Felix; id_orcid0000-0002-8495-6610 +2 more
openaire +3 more sources

