搜索结果: 1-4 共查到“军事学 AKE”相关记录4条 . 查询时间(0.109 秒)
IoT-Friendly AKE: Forward Secrecy and Session Resumption Meet Symmetric-Key Cryptography
Security protocols Authenticated key exchange Symmetric-key cryptography
font style='font-size:12px;'>
2019/8/13
With the rise of the Internet of Things and the growing popularity of constrained end-devices, several security protocols are widely deployed or strongly promoted (e.g., Sigfox, LoRaWAN, NB-IoT). Base...
Understanding and Constructing AKE via Double-key Key Encapsulation Mechanism
Authenticated Key Exchange CK Model Key Encapsulation Mechanism
font style='font-size:12px;'>
2018/11/19
Motivated by abstracting the common idea behind several implicitly authenticated key exchange (AKE) protocols, we introduce a primitive that we call double-key key encapsulation mechanism (2-key KEM)....
Efficient Compilers for After-the-Fact Leakage: from CPA to CCA-2 secure PKE to AKE
After-the-Fact leakage bounded memory leakage split-state
font style='font-size:12px;'>
2017/5/25
The goal of leakage-resilient cryptography is to construct cryptographic algorithms that are secure even if the adversary obtains side-channel information from the real world implementation of these a...
Nonce-based Kerberos is a Secure Delegated AKE Protocol
Kerberos Nonce AKE
font style='font-size:12px;'>
2016/3/1
Kerberos is one of the most important cryptographic protocols, first because it is the basisc authentication protocol in Microsoft's Active Directory and shipped with every major operating system, and...