Results 61 to 70 of about 3,103,043 (192)
An Alternative Diffie-Hellman Protocol
The Diffie−Hellman protocol, ingenious in its simplicity, is still the major solution in protocols for generating a shared secret in cryptography for e-trading and many other applications after an impressive number of decades.
Eric Järpe
doaj +1 more source
Verifiable three-party secure key exchange protocol based on eigenvalue
In order to solve the problem that the traditional key exchange protocol,which was not flexible enough and flawed in security,cannot provide the function of three-party key negotiation,firstly,a simple and flexible three-party key exchange scheme that ...
Yanshuo ZHANG +3 more
doaj
Robust and Lightweight Key Exchange (LKE) Protocol for Industry 4.0
Industry 4.0 has brought solutions for faster data accessibility, fault identification, performance analysis, and control of machines remotely by managers.
Gurjot Singh Gaba +5 more
doaj +1 more source
Semi – Chaotic Mutual Learning Platform for Key – Exchange Algorithm Using Neural Network [PDF]
Neural network has been emerged the cryptography field as efficient tool for both cryptanalysis and cryptography due to its amazing ability to explore solution space for a given problem.
Enas H. Salih +2 more
doaj +1 more source
Plactic key agreement (insecure?)
Plactic key agreement is a new type of cryptographic key agreement that uses Knuth’s multiplication of semistandard tableaux from combinatorial algebra.
Brown Daniel R. L.
doaj +1 more source
Estimation of the Behavioral Equilibrium Real Exchange Rate of the Czech Koruna [PDF]
Purpose of the article The paper examines the behavior of the real exchange rate in the Czech Republic. It focuses on the analysis of its driving forces with the emphasis on the turbulences which have been lately seen in the financial and real sector of ...
Pošta, Vít
core
Authenticated tree parity machine key exchange
The synchronisation of Tree Parity Machines (TPMs), has proven to provide a valuable alternative concept for secure symmetric key exchange. Yet, from a cryptographer's point of view, authentication is at least as important as a secure exchange of keys ...
Schaumburg, André, Volkmer, Markus
core
Group key exchange protocols withstanding ephemeral‐key reveals
When a group key exchange protocol is executed, the session key is typically extracted from two types of secrets: long‐term keys (for authentication) and freshly generated (often random) values. The leakage of this latter so‐called ephemeral keys has been extensively analysed in the 2‐party ...
González Vasco, María Isabel +2 more
openaire +2 more sources
Key Exchange Using Passwords and Long Keys [PDF]
We propose a new model for key exchange (KE) based on a combination of different types of keys. In our setting, servers exchange keys with clients, who memorize short passwords and carry (stealable) storage cards containing long (cryptographic) keys. Our setting is a generalization of that of Halevi and Krawczyk [16] (HK), where clients have a password
Vladimir Kolesnikov, Charles Rackoff
openaire +1 more source
Three-party password authenticated key agreement protocol with user anonymity based on lattice
With the rapid development of quantum theory and the existence of polynomial algorithm in quantum computation based on discrete logarithm problem and large integer decomposition problem,the security of the algorithm was seriously threatened.Therefore,two
Caifen WANG, Li CHEN
doaj

