Results 61 to 70 of about 3,103,043 (192)

An Alternative Diffie-Hellman Protocol

open access: yesCryptography, 2020
The Diffie−Hellman protocol, ingenious in its simplicity, is still the major solution in protocols for generating a shared secret in cryptography for e-trading and many other applications after an impressive number of decades.
Eric Järpe
doaj   +1 more source

Verifiable three-party secure key exchange protocol based on eigenvalue

open access: yesTongxin xuebao, 2019
In order to solve the problem that the traditional key exchange protocol,which was not flexible enough and flawed in security,cannot provide the function of three-party key negotiation,firstly,a simple and flexible three-party key exchange scheme that ...
Yanshuo ZHANG   +3 more
doaj  

Robust and Lightweight Key Exchange (LKE) Protocol for Industry 4.0

open access: yesIEEE Access, 2020
Industry 4.0 has brought solutions for faster data accessibility, fault identification, performance analysis, and control of machines remotely by managers.
Gurjot Singh Gaba   +5 more
doaj   +1 more source

Semi – Chaotic Mutual Learning Platform for Key – Exchange Algorithm Using Neural Network [PDF]

open access: yesEngineering and Technology Journal, 2012
Neural network has been emerged the cryptography field as efficient tool for both cryptanalysis and cryptography due to its amazing ability to explore solution space for a given problem.
Enas H. Salih   +2 more
doaj   +1 more source

Plactic key agreement (insecure?)

open access: yesJournal of Mathematical Cryptology, 2023
Plactic key agreement is a new type of cryptographic key agreement that uses Knuth’s multiplication of semistandard tableaux from combinatorial algebra.
Brown Daniel R. L.
doaj   +1 more source

Estimation of the Behavioral Equilibrium Real Exchange Rate of the Czech Koruna [PDF]

open access: yes, 2010
Purpose of the article The paper examines the behavior of the real exchange rate in the Czech Republic. It focuses on the analysis of its driving forces with the emphasis on the turbulences which have been lately seen in the financial and real sector of ...
Pošta, Vít
core  

Authenticated tree parity machine key exchange

open access: yes, 2004
The synchronisation of Tree Parity Machines (TPMs), has proven to provide a valuable alternative concept for secure symmetric key exchange. Yet, from a cryptographer's point of view, authentication is at least as important as a secure exchange of keys ...
Schaumburg, André, Volkmer, Markus
core  

Group key exchange protocols withstanding ephemeral‐key reveals

open access: yesIET Information Security, 2018
When a group key exchange protocol is executed, the session key is typically extracted from two types of secrets: long‐term keys (for authentication) and freshly generated (often random) values. The leakage of this latter so‐called ephemeral keys has been extensively analysed in the 2‐party ...
González Vasco, María Isabel   +2 more
openaire   +2 more sources

Key Exchange Using Passwords and Long Keys [PDF]

open access: yes, 2006
We propose a new model for key exchange (KE) based on a combination of different types of keys. In our setting, servers exchange keys with clients, who memorize short passwords and carry (stealable) storage cards containing long (cryptographic) keys. Our setting is a generalization of that of Halevi and Krawczyk [16] (HK), where clients have a password
Vladimir Kolesnikov, Charles Rackoff
openaire   +1 more source

Three-party password authenticated key agreement protocol with user anonymity based on lattice

open access: yesTongxin xuebao, 2018
With the rapid development of quantum theory and the existence of polynomial algorithm in quantum computation based on discrete logarithm problem and large integer decomposition problem,the security of the algorithm was seriously threatened.Therefore,two
Caifen WANG, Li CHEN
doaj  

Home - About - Disclaimer - Privacy