Zobrazeno 1 - 10
of 7 814
pro vyhledávání: '"Key exchange"'
Publikováno v:
AIMS Mathematics, Vol 9, Iss 8, Pp 20677-20691 (2024)
This paper introduced a novel semiring structure involving nonnegative integers, where operations depended on the comparison of the magnitudes of decimal digit sums. Consequently, a corresponding matrix semiring can be established on this commutative
Externí odkaz:
https://doaj.org/article/5ef77382d7d64b67a3a2fc65350452ff
Autor:
Szilard Pfeiffer, Norbert Tihanyi
Publikováno v:
IEEE Access, Vol 12, Pp 957-980 (2024)
In this paper, D(HE)at, a practical denial-of-service (DoS) attack targeting the finite field Diffie-Hellman (DH) key exchange protocol, is presented, allowing remote users to send non-public keys to the victim, triggering expensive server-side DH mo
Externí odkaz:
https://doaj.org/article/8e14266e325c4a3992d12aeba708633b
Publikováno v:
AIMS Mathematics, Vol 9, Iss 5, Pp 13537-13552 (2024)
This paper presents the generalized Pell $ p- $numbers and provides some related results. A new sequence is defined using the characteristic polynomial of the Pell $ p- $numbers and generalized Mersenne numbers. Two algorithms for Diffie-Hellman key
Externí odkaz:
https://doaj.org/article/525b0e12181f4210b0b862ee2409b6ee
Autor:
M. F. Nasrutdinov
Publikováno v:
Учёные записки Казанского университета. Серия Физико-математические науки, Vol 166, Iss 1, Pp 52-57 (2024)
A key exchange protocol over a special class of formal matrices Bn(R, P) was proposed. The potential of this design for constructing key exchange protocols using suitable associative rings and ideals over them was shown.
Externí odkaz:
https://doaj.org/article/b393ea3d058546f39033d30199bdb28e
Publikováno v:
International Journal of Computational Intelligence Systems, Vol 17, Iss 1, Pp 1-15 (2024)
Abstract As Edge AI systems become more prevalent, ensuring data privacy and security in these decentralized networks is essential. In this work, a novel hybrid cryptographic mechanism was presented by combining Ant Lion Optimization (ALO) and Diffie
Externí odkaz:
https://doaj.org/article/7d8a09a79cec465ebfe94d49a80ddd2f
Autor:
Pia Bauspieb, Tjerand Silde, Matej Poljuha, Alexandre Tullot, Anamaria Costache, Christian Rathgeb, Jascha Kolberg, Christoph Busch
Publikováno v:
IEEE Access, Vol 12, Pp 46596-46615 (2024)
Biometric data are uniquely suited for connecting individuals to their digital identities. Deriving cryptographic key exchange from successful biometric authentication therefore gives an additional layer of trust compared to password-authenticated ke
Externí odkaz:
https://doaj.org/article/b7f4c251ec9c45338fc2db6d47643e7d
Publikováno v:
Iraqi Journal for Computers and Informatics, Vol 49, Iss 2, Pp 100-110 (2023)
In the unreliable domain of data communication, safeguarding information from unauthorized access is imperative. Given the widespread application of images across various fields, ensuring the confidentiality of image data holds paramount importance.
Externí odkaz:
https://doaj.org/article/fc3459e51fdb4456928c4ad0eae16a6a
Publikováno v:
Journal of Telecommunications and Information Technology, Vol 1, Iss 1 (2024)
The article proposes a new energy-efficient protocol designed for star topology wireless sensor networks. The protocol has been implemented using ECC, although it can be easily adapted to any algebraic structure, where the discrete logarithm problem
Externí odkaz:
https://doaj.org/article/61292e1f7fb04b1a919353dded677057
Publikováno v:
PeerJ Computer Science, Vol 10, p e1960 (2024)
In this article, a password-authenticated key exchange (PAKE) version of the National Institute of Standards and Technology (NIST) post-quantum cryptography (PQC) public-key encryption and key-establishment standard is constructed. We mainly focused
Externí odkaz:
https://doaj.org/article/3b15ded60be649f7bfed3f4216c36aa3
Autor:
Kübra Seyhan, Sedat Akleylek
Publikováno v:
PeerJ Computer Science, Vol 10, p e1791 (2024)
In this article, we propose a novel bilateral generalization inhomogenous short integer solution (BiGISIS)-based password-authenticated key exchange (PAKE) scheme for post-quantum era security. The hardness assumption of the constructed PAKE is based
Externí odkaz:
https://doaj.org/article/7db5c3721d1244f0a5c2e5ff736b11f9