军事学 >>> 军事学 >>> 军队指挥学 >>> 密码学 >>>
搜索结果: 1-10 共查到密码学 Standards相关记录10条 . 查询时间(0.084 秒)
ISO/IEC standardizes several chosen ciphertext-secure key encapsulation mechanism (KEM) schemes in ISO/IEC 18033-2. However, all ISO/IEC KEM schemes are not quantum resilient. In this paper, we introd...
Quantum computing poses challenges to public key signature schemes as we know them today. LMS and XMSS are two hash based signature schemes that have been proposed in the IETF as quantum secure. Both ...
This paper analyzes the cost of breaking ECC under the following assumptions: (1) ECC is using a standardized elliptic curve that was actually chosen by an attacker; (2) the attacker is aware of a vul...
The Protocol for Lightweight Authentication of Identity (PLAID) aims at secure and private authentication between a smart card and a terminal. Originally developed by a unit of the Australian Depart...
In the past few years, the design of RFID authentication protocols in accordance with the EPC Class-1 Generation-2 (EPC C1 G2) standards, has been one of the most important challenges in the informat...
The Diffie-Hellman key agreement protocol is based on taking large powers of a generator of a prime-order cyclic group. Some generators allow faster exponentiation. We show that to a large extent, ...
A Cryptographic Tour of the IPsec Standards     IP  IPsec  network security  cryptography  key management       font style='font-size:12px;'> 2008/11/6
In this article, we provide an overview of cryptography and cryptographic key man- agement as they are speci¯ed in IPsec, a popular suite of standards for providing commu- nications security an...
Attacking the IPsec Standards in Encryption-only Configurations     IPsec  integrity  encryption  ESP       font style='font-size:12px;'> 2008/9/4
At Eurocrypt 2006, Paterson and Yau demonstrated how aws in the Linux implementation of IPsec could be exploited to break encryption-only configurations of ESP, the IPsec encryption protocol. Their ...
We give a concise statement of a test for security of elliptic curves that should be inserted into the standards for elliptic curve cryptography.
A Note on Signature Standards     Digital Signatures  ECDSA  ECGDSA  ECKCDSA       font style='font-size:12px;'> 2008/5/28
A major security goal for signature schemes is to prevent an adver- sary from producing new valid signatures even though he can receive valid signatures of any messages from the legitimate signer.

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...