搜索结果: 1-15 共查到“军事学 Protocol”相关记录393条 . 查询时间(0.14 秒)
Puncturable Signatures and Applications in Proof-of-Stake Blockchain Protocol
Puncturable Signatures PoS Blockchain
font style='font-size:12px;'>
2019/8/30
Proof-of-stake (PoS) blockchain protocols are emerging as one of the most promising alternative to the energy-consuming proof-of-work protocols. However, one particularly critical threat in the PoS se...
Verifpal: Cryptographic Protocol Analysis for Students and Engineers
cryptographic protocols formal verification
font style='font-size:12px;'>
2019/8/30
Contemporary research in symbolic formal verification has led to confirming security guarantees (as well as finding attacks) in secure channel protocols such as TLS and Signal. However, formal verific...
Modifying The Tropical Version of Stickel’s Key Exchange Protocol
Stickel’s protocol Tropical Algebra Cryptography
font style='font-size:12px;'>
2019/8/2
A tropical version of Stickel’s key exchange protocol was suggested by Grigoriev and Sphilrain [2] and successfully attacked by Kotov and Ushakov [5]. We suggest some modifications of this scheme that...
A Chosen Random Value Attack on WPA3 SAE authentication protocol
SAE WPA3 Dragonfly key exchange
font style='font-size:12px;'>
2019/7/15
SAE (Simultaneous Authentication of Equals), is a password authenticated key exchange protocol, which is designed to replace the WPA2-PSK based authentication. The SAE Authentication Protocol supports...
Distributing any Elliptic Curve Based Protocol: With an Application to MixNets
cryptographic protocols SPDZ
font style='font-size:12px;'>
2019/7/8
We show how to perform a full-threshold nn-party actively secure MPC protocol over a subgroup of order pp of an elliptic curve group E(K)E(K). This is done by utilizing a full-threshold nn-party activ...
The privacy of the TLS 1.3 protocol
privacy TLS 1.3 AKE protocols
font style='font-size:12px;'>
2019/6/26
TLS (Transport Layer Security) is a widely deployed protocol that plays a vital role in securing Internet trafic. Given the numerous known attacks for TLS 1.2, it was imperative to change and even red...
A Secure Publish/Subscribe Protocol for Internet of Things
MQTT Security Cryptography
font style='font-size:12px;'>
2019/6/24
The basic concept behind the emergence of Internet of Things (IoT) is to connect as many objects to the Internet as possible in an attempt to make our lives better in some way. However, connecting eve...
An Efficient Secure Three-Party Sorting Protocol with an Honest Majority
sorting secret sharing three-party computation
font style='font-size:12px;'>
2019/6/13
We present a novel three-party sorting protocol secure against passive adversaries in the honest majority setting. The protocol can be easily combined with other secure protocols which work on shared ...
Revelio: A MimbleWimble Proof of Reserves Protocol
Cryptocurrency MimbleWimble Grin
font style='font-size:12px;'>
2019/6/12
We reveal Revelio, a new privacy-preserving proof of reserves protocol for Grin exchanges. By design, Revelio allows the detection of collusion between exchanges while hiding the identities of the out...
BlockQuick: Super-Light Client Protocol for Blockchain Validation on Constrained Devices
blockchain proof of work
font style='font-size:12px;'>
2019/5/29
Today server authentication is largely handled through Public Key Infrastructure (PKI) in both the private and the public sector. PKI is established as the defacto standard for Internet communication ...
A Smart Contract Refereed Data Retrieval Protocol with a Provably Low Collateral Requirement
blockchain collateral decentralized ledger
font style='font-size:12px;'>
2019/5/23
We present a protocol for a cryptoeconomic fair exchange of data previously owned by the purchaser for tokens that functions even when both parties are anonymous. This enables peer-to-peer data storag...
FloodXMR: Low-cost transaction flooding attack with Monero’s bulletproof protocol
Monero Privacy Traceability
font style='font-size:12px;'>
2019/5/13
Monero is one of the first and most popular cryptocurrencies to address privacy issues of other crypto coins such as Bitcoin. Monero has a market capitalization of over one billion US dollars, and is ...
UniqueChain: A Fast, Provably Secure Proof-of-Stake Based Blockchain Protocol in the Open Setting
proof-of-stake secure initialization uniqueness
font style='font-size:12px;'>
2019/5/13
We present "UniqueChain", a proof-of-stake based blockchain protocol that achieves secure initialization of newly joining parties without any additional trusted assumptions and fast messages (transact...
Flexible Authenticated and Confidential Channel Establishment (fACCE): Analyzing the Noise Protocol Framework
channel establishment ACCE mutli-stage
font style='font-size:12px;'>
2019/5/5
The Noise protocol framework is a suite of channel establishment protocols, of which each individual protocol ensures various security properties of the transmitted messages, but keeps specification, ...
A Novel FPGA Architecture and Protocol for the Self-attestation of Configurable Hardware
FPGA configurable hardware remote attestation
font style='font-size:12px;'>
2019/4/23
Field-Programmable Gate Arrays or FPGAs are popular platforms for hardware-based attestation. They offer protection against physical and remote attacks by verifying if an embedded processor is running...