搜索结果: 1-15 共查到“军事学 M factor”相关记录32条 . 查询时间(0.109 秒)
HMAKE: Legacy-Compliant Multi-factor Authenticated Key Exchange from Historical Data
Historical Data Authentication Authenticated Key Exchange
font style='font-size:12px;'>
2019/5/9
In this paper, we introduce two lightweight historical data based multi-factor authenticated key exchange (HMAKE) protocols in the random oracle model. Our HMAKE protocols use a symmetric secret key, ...
Minimizing Trust in Hardware Wallets with Two Factor Signatures
digital signatures threshold cryptography
font style='font-size:12px;'>
2019/1/9
We introduce the notion of two-factor signatures (2FS), a generalization of a two-out-of-two threshold signature scheme in which one of the parties is a hardware token which can store a high-entropy s...
Two-Factor Authentication with End-to-End Password Security
password authentication two-factor authentication short authenticated string model
font style='font-size:12px;'>
2018/1/11
We present a secure two-factor authentication (TFA) scheme based on the possession by the user of a password and a crypto-capable device. Security is ``end-to-end" in the sense that the attacker can a...
PROVABLY SECURE TWO-FACTOR AUTHENTICATION SCHEME FOR E-HEALTH USING SMART CARD
elliptic curve cryptosystem smart cards hash functions
font style='font-size:12px;'>
2017/6/6
Nowadays, IT enabled service gain more attention due to easy to access resources from remote place. IT enabled services are extend their service to all kind of business and personal related applicatio...
A Novel Multi-factor ID-based Designated Verifier Signature scheme
cryptographic protocols digital signatures
font style='font-size:12px;'>
2016/12/24
In a classic digital signature scheme, the global community is capable of verifying a signature. In a designated verifier scheme (DVS), only the designated verifier has this capability. In a classic D...
Moderate dietary fat consumption as a risk factor for ischemic heart disease in a population with a low fat intake: a case-control study in Korean men
Republic of Korea men case-control study
font style='font-size:12px;'>
2016/6/13
Dietary fat intake is associated with the incidence
of ischemic heart disease (IHD) in Western countries. In populations
in which both the average dietary fat consumption and the
incidence of IHD a...
Tightly-Secure Pseudorandom Functions via Work Factor Partitioning
Tight security pseudorandom functions provable security
font style='font-size:12px;'>
2016/2/23
We introduce a new technique for tight security proofs called work
factor partitioning. Using this technique in a modified version of the framework
of Dottling and Schr ¨ oder (CRYPTO 2015), we obta...
Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment
Two-factor authentication User anonymity Smart card
font style='font-size:12px;'>
2016/1/25
Despite two decades of intensive research, it remains a challenge to design a practical anonymous two-factor authentication
scheme, for the designers are confronted with an impressive list of securit...
Cryptanalysis and Improvement on Robust Three-Factor Remote User Authentication Scheme with Key Agreement for Multimedia System
cryptographic protocols Authentication scheme
font style='font-size:12px;'>
2016/1/9
A three-factor authentication combines biometrics information with user password and smart card to provide security-enhanced user authentication. An proposed user authentication scheme improved Das’s ...
Two-factor authentication for the Bitcoin protocol
implementation Bitcoin
font style='font-size:12px;'>
2016/1/8
We show how to realize two-factor authentication for a Bitcoin wallet
employing the two-party ECDSA signature protocol adapted from MacKenzie
& Reiter (2004). We also present a prototypic implementa...
Physical functions : the common factor of side-channel and fault attacks ?
Differential Power Analysis Differential Fault Analysis
font style='font-size:12px;'>
2016/1/6
Security is a key component for information technologies and
communication. Among the security threats, a very important one is
certainly due to vulnerabilities of the integrated circuits that imple...
A Simple Method for Obtaining Relations Among Factor Basis Elements for Special Hyperelliptic Curves
hyperelliptic curves index calculus algorithm Nagao’s decomposition
font style='font-size:12px;'>
2016/1/3
Nagao had proposed a decomposition method for divisors of hyperelliptic curves defined over a field \rFqn with n≥2. Joux and Vitse had later proposed a variant which provided relations among the facto...
M-MAP: Multi-Factor Memory Authentication for Secure Embedded Processors
Secure Processor Memory Safety Authentication
font style='font-size:12px;'>
2015/12/23
The challenges faced in securing embedded computing systems against multifaceted memory
safety vulnerabilities have prompted great interest in the development of memory safety countermeasures.
These...
Factor Base Discrete Logarithms in Kummer Extensions
Discrete logarithm Finite fields Kummer extension
font style='font-size:12px;'>
2015/12/23
The discrete logarithm over finite fields of small characteristic can be solved much more efficiently than previously thought. This algorithmic breakthrough is based on heuristic polynomial time algor...
On the Usability of Two-Factor Authentication
Two-factor authentication Usability User anonymity
font style='font-size:12px;'>
2015/12/21
Smart-card-based password authentication, known as twofactor
authentication, is one of the most widely used security mechanisms
to validate the legitimacy of a remote client, who must hold a valid s...