Results 71 to 80 of about 10,790,774 (280)

Design and analysis of group key exchange protocols [PDF]

open access: yes, 2010
A group key exchange (GKE) protocol allows a set of parties to agree upon a common secret session key over a public network. In this thesis, we focus on designing efficient GKE protocols using public key techniques and appropriately revising security ...
Gorantla, Malakondayya Choudary
core   +1 more source

An active attack on a distributed Group Key Exchange system

open access: yes, 2016
In this work, we introduce an active attack on a Group Key Exchange protocol by Burmester and Desmedt. The attacker obtains a copy of the shared key, which is created in a collaborative manner with the legal users in a communication ...
Baouch, Mohamed   +3 more
core   +1 more source

Non-invertible key exchange protocol

open access: yesSN Applied Sciences, 2020
We investigate a cryptosystem through what we call non-invertible cryptography. As a result of a continuous refinement process, we present a new key exchange method to establish a secret key between two remote parties.
Luis Adrian Lizama-Perez
doaj   +1 more source

Proposal to Complex DES Security Using Diffie Hellman Injection [PDF]

open access: yesEngineering and Technology Journal, 2011
Data Encryption Standard (DES) is based on a round of starters, from the results of the use of multi-stage permutation and replacement to the more complex algorithm which adopts the symmetric key.
Shatha habeeb Jafar
doaj   +1 more source

Smooth Hash Proof System Based on the Learning With Errors Problem With Multi-Bit Key Output

open access: yesIEEE Access, 2019
Since hash proof system (HPS) can be utilized to build versatilely cryptographic schemes, the study on realizing this cryptographic primitive has been a very active research area. With the increasing concerns on the huge progress in quantum computing, it
Momeng Liu   +3 more
doaj   +1 more source

EasyUC: using EasyCrypt to mechanize proofs of universally composable security [PDF]

open access: yes, 2019
We present a methodology for using the EasyCrypt proof assistant (originally designed for mechanizing the generation of proofs of game-based security of cryptographic schemes and protocols) to mechanize proofs of security of cryptographic protocols ...
Canetti, Ran   +2 more
core   +2 more sources

Inhibition of Poly(ethylenediaminetetraacetic acid-diethanolamine) on Deposition of Calcium Sulfate Crystal in Simulated Industrial Water

open access: yesCrystals, 2020
Calcium sulfate scale is a typical deposit on the equipment pieces or pipes of an industrial water system. Scale inhibitors could obviously reduce the precipitation of calcium sulfate crystal.
Jian-Qiu Chen   +4 more
doaj   +1 more source

A new key exchange protocol based on the decomposition problem [PDF]

open access: yes, 2005
In this paper we present a new key establishment protocol based on the decomposition problem in non-commutative groups which is: given two elements $w, w_1$ of the platform group $G$ and two subgroups $A, B \subseteq G$ (not necessarily distinct), find ...
Shpilrain, Vladimir, Ushakov, Alexander
core   +2 more sources

An Active Attack on a Multiparty Key Exchange Protocol [PDF]

open access: yes, 2015
The multiparty key exchange introduced in Steiner et al.\@ and presented in more general form by the authors is known to be secure against passive attacks.
Lopez-Ramos, Juan Antonio   +3 more
core   +4 more sources

Survey of braid-based cryptography

open access: yesTongxin xuebao, 2009
The achievements of braid-based cryptography were surveyed: some recently developed cryptographic schemes were introduced, including key exchange protocols enciphering-deciphering and authentication schemes.
ZHU Ping1, WEN Qiao-yan2
doaj  

Home - About - Disclaimer - Privacy