搜索结果: 1-3 共查到“军队指挥学 symmetric-key cryptography”相关记录3条 . 查询时间(0.046 秒)
IoT-Friendly AKE: Forward Secrecy and Session Resumption Meet Symmetric-Key Cryptography
Security protocols Authenticated key exchange Symmetric-key cryptography
2019/8/13
With the rise of the Internet of Things and the growing popularity of constrained end-devices, several security protocols are widely deployed or strongly promoted (e.g., Sigfox, LoRaWAN, NB-IoT). Base...
Quantum-Secure Symmetric-Key Cryptography Based on Hidden Shifts
secret-key cryptography quantum-security
2016/12/8
Recent results of Kaplan et al., building on previous work by Kuwakado and Morii, have shown that a wide variety of classically-secure symmetric-key cryptosystems are completely broken when exposed to...
Non-Malleable Extractors and Symmetric Key Cryptography from Weak Secrets
Non-Malleable Extractors Symmetric Key Cryptography Weak Secrets
2009/6/10
We study the question of basing symmetric key cryptography on weak secrets. In this setting, Alice
and Bob share an n-bit secretW, which might not be uniformly random, but the adversary has at least
...