Zobrazeno 1 - 10
of 54
pro vyhledávání: '"López Ramos, Juan Antonio"'
Autor:
Camazón Portela, Daniel1 (AUTHOR) danielcp@ual.es, López Ramos, Juan Antonio1 (AUTHOR)
Publikováno v:
Mathematics (2227-7390). Dec2024, Vol. 12 Issue 23, p3634. 3p.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Camazón Portela, Daniel1 (AUTHOR) daniel.camazon@uva.es, López Ramos, Juan Antonio2 (AUTHOR) jlopez@ual.es
Publikováno v:
Mathematics (2227-7390). Jul2023, Vol. 11 Issue 14, p3079. 12p.
A new proposal for group key exchange is introduced which proves to be both efficient and secure and compares favorably with state of the art protocols.
Comment: to appear in Mathematical Methods in the Applied Sciences
Comment: to appear in Mathematical Methods in the Applied Sciences
Externí odkaz:
http://arxiv.org/abs/1610.09244
In this paper we use the nonrepresentable ring E_p(m)to introduce public key cryptosystems in noncommutative settings and based on the Semigrouop Action Problem and the Decomposition Problem respectively.
Externí odkaz:
http://arxiv.org/abs/1606.05457
In this work, we introduce an active attack on a Group Key Exchange protocol by Burmester and Desmedt. The attacker obtains a copy of the shared key, which is created in a collaborative manner with the legal users in a communication group.
Externí odkaz:
http://arxiv.org/abs/1603.09090
In this work we provide a suite of protocols for group key management based on general semigroup actions. Construction of the key is made in a distributed and collaborative way. Examples are provided that may in some cases enhance the security level
Externí odkaz:
http://arxiv.org/abs/1509.01075
The multiparty key exchange introduced in Steiner et al.\@ and presented in more general form by the authors is known to be secure against passive attacks. In this paper, an active attack is presented assuming malicious control of the communications
Externí odkaz:
http://arxiv.org/abs/1509.01081
Publikováno v:
Applied Sciences (2076-3417); Sep2024, Vol. 14 Issue 18, p8179, 14p