搜索结果: 1-15 共查到“军事学 key agreement protocol”相关记录45条 . 查询时间(0.218 秒)
Conjugacy Separation Problem in Braids: an Attack on the Original Colored Burau Key Agreement Protocol
Algebraic eraser braid group colored Burau presentation
2018/5/28
In this paper, we consider the conjugacy separation search problem in braid groups. We deeply redesign the algorithm presented in (Myasnikov & Ushakov, 2009) and provide an experimental evidence that ...
Kayawood, a Key Agreement Protocol
Group Theoretic Cryptography Diffie--Hellman Key Agreement
2017/12/1
Public-key solutions based on number theory, including RSA, ECC, and Diffie-Hellman, are subject to various quantum attacks, which makes such solutions less attractive long term. Certain group theoret...
Attacks to a proxy-mediated key agreement protocol based on symmetric encryption
key agreement proxy re-encryption
2016/12/7
In this paper, we describe several attacks to the protocol by Nguyen et al. presented at ESORICS 2016, an authenticated key agreement protocol mediated by a proxy entity, restricted to only symmetric ...
A Secure and efficient elliptic curve based authentication and key agreement protocol suitable for WSN
cryptographic protocols
2014/3/12
Authentication and key agreement protocols play an important role in wireless sensor communication networks. Recently Xue et al'. suggested a key agreement protocols for WSN which in this paper we sho...
On the security of an identity-based authenticated group key agreement protocol for imbalanced mobile networks
passive attack forward secrecy backward secrecy
2013/2/21
Recently, Islam and Biswas proposed a pairing-free identity-based authenticated group key agreement protocol for imbalanced mobile networks. However, in this letter, we point out that this protocol ca...
Cryptanalysis of a pairing-free identity-based authenticated group key agreement protocol for imbalanced mobile networks
group key agreement imbalanced mobile networks
2013/2/21
Recently, Isalam and Biswas proposed a new group key agreement (GKA) protocol for imbalanced mobile networks. In this letter, we will show that Isalam et al.’s GKA protocol is not secure.
Cryptanalysis of an efficient certificateless two-party authenticated key agreement protocol
cryptographic protocols / Authentication Certificateless cryptography
2013/2/21
Recently, He et al. (Computers and Mathematics with Applications, 2012, 64(6): 1914-1926) proposed a new efficient certificateless two-party authenticated key agreement protocol. They claimed their pr...
An Improved Certificateless Authenticated Key Agreement Protocol
certificateless public key cryptography key agreement man-in-the-middle attack
2012/6/14
Recently, Mokhtarnameh, Ho, Muthuvelu proposed a certificateless key agreement protocol. In this paper, we show that their protocol is insecure against a man-in-the-middle attack which is a severe dis...
An Improved Certificateless Authenticated Key Agreement Protocol
cryptographic protocols / certificateless public key cryptography key agreement man-in-the-middle attack bilinear pairing
2012/3/20
Recently, Mokhtarnameh, Ho, Muthuvelu proposed a certificateless key agreement protocol. In this paper, we show that their protocol is insecure against a man-in-the-middle attack which is a severe dis...
An efficient certificateless authenticated key agreement protocol without bilinear pairings
Certificateless cryptography Authenticated key agreement
2011/7/25
Certificateless public key cryptography simplifies the complex certificate management in the traditional public key cryptography and resolves the key escrow problem in identity-based cryptography.
Cryptanalysis of a key agreement protocol based on chaotic Hash
Chaos Hash function Key agreement Chebyshev
2011/7/25
With the rapid development of theory and application of chaos, more and more researchers are focusing on chaos based cryptosystems.
Cryptanalysis of a key agreement protocol based on chaotic Hash
cryptographic protocols / Chaos Hash function Key agreement Chebyshev Password guessing attack
2012/3/27
With the rapid development of theory and application of chaos, more and more researchers are focusing on chaos based cryptosystems. Recently, Guo et al.’s [X. Guo, J. Zhang, Secure group key agreement...
Breaking a certificateless key agreement protocol withour bilinear pairing
public-key cryptography Certificateless cryptography Authenticated key agreement Provable security Bilinear pairings Elliptic curve
2011/6/9
Certificateless public key cryptography simplifies the complex certificate management in the traditional public key cryptography and resolves the key escrow problem in identity-based cryptography. Man...
Private Identification, Authentication and Key Agreement Protocol with Security Mode Setup
applications
2012/3/29
Identification, authentication and key agreement protocol of UMTS networks with security mode setup has some weaknesses in the case of mutual freshness of key agreement, DoS-attack resistance, and eff...
Private Identification, Authentication and Key Agreement Protocol with Security Mode Setup
Identification Authentication Key Agreement Privacy UMTS Mobile Network Security Protocol
2011/2/23
Identification, authentication and key agreement protocol of UMTS networks with security mode setup has some weaknesses in the case of mutual freshness of key agreement, DoS-attack resistance, and eff...