Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2017 at "Wireless Personal Communications"
DOI: 10.1007/s11277-016-3667-0
Abstract: Yoking proof is a very useful security primitive that can be used to prove the co-existence of two or multiple entities in an identification protocol. It can be incorporated into radio frequency identification (RFID) protocols…
read more here.
Keywords:
proof;
proof key;
key exchange;
privacy ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2017 at "Science China Information Sciences"
DOI: 10.1007/s11432-017-9177-7
Abstract: Dear editor, One-round key exchange (ORKE) represents a special class of two-message key exchange. It enables two parties to establish a shared session key within only one communication round. The first merit of ORKE is…
read more here.
Keywords:
one round;
round key;
key exchange;
security ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2018 at "Journal of Ambient Intelligence and Humanized Computing"
DOI: 10.1007/s12652-017-0622-1
Abstract: Identity-based user authentication protocols have been presented to be applicable to resource-constrained devices such as mobile phones. Unfortunately, the previous protocols have the drawback of the key escrow problem. A new protocol of a user…
read more here.
Keywords:
protocol;
user authentication;
key exchange;
client server ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2018 at "IEEE Access"
DOI: 10.1109/access.2018.2844190
Abstract: With the increasing use of mobile devices, a secure communication and key exchange become the significant security issues in mobile environments. However, because of open network environments, mobile user can be vulnerable to various attacks.…
read more here.
Keywords:
authentication;
security;
key exchange;
efficient two ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2020 at "IEEE Access"
DOI: 10.1109/access.2020.2993296
Abstract: Group Key Exchange (GKE) is required for secure group communication with high confidentiality. In particular, a trusted authority can handle issues that happen by the malicious actions of group members, but it is expensive to…
read more here.
Keywords:
implementation;
constant round;
key exchange;
group ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2022 at "IEEE Internet of Things Journal"
DOI: 10.1109/jiot.2021.3085595
Abstract: Ensuring security and privacy in the Internet of Things (IoT) while taking into account the resource-constrained nature of IoT devices is challenging. In smart home (SH) IoT applications, remote users (RUs) need to communicate securely…
read more here.
Keywords:
key exchange;
lightweight user;
lake 6sh;
6lowpan based ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2018 at "IEEE Systems Journal"
DOI: 10.1109/jsyst.2017.2685524
Abstract: Authenticated key exchange (AKE) scheme is one of the most widely used cryptographic primitives in practice, even in the Internet-of-Things (IoT) environments. In order to resist side-channel attacks, several works have been proposed for defining…
read more here.
Keywords:
leakage resilient;
ake;
identity based;
authenticated key ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2021 at "IEEE Systems Journal"
DOI: 10.1109/jsyst.2020.2986506
Abstract: Authenticated key exchange (AKE) is a crucial cryptographic primitive used for establishing an authenticated and confidential communication channel between parties, which has been widely used in our daily life when we surf on the Internet.…
read more here.
Keywords:
one way;
key exchange;
anonymity;
authenticated key ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2018 at "IEEE Transactions on Computers"
DOI: 10.1109/tc.2017.2773524
Abstract: NewHope and NewHope-Simple are two recently proposed post-quantum key exchange protocols based on the hardness of the Ring-LWE problem. Due to their high security margins and performance, there have already been discussions and proposals for…
read more here.
Keywords:
post quantum;
key exchange;
neon;
exchange ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2018 at "IEEE Transactions on Computers"
DOI: 10.1109/tc.2018.2808527
Abstract: Ring Learning With Errors (RLWE)-based key exchange is one of the most efficient and secure primitive for post-quantum cryptography. One common approach to achieve key exchange over RLWE is error reconciliation. Recently, an efficient attack…
read more here.
Keywords:
attack;
based key;
rlwe based;
key exchange ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2018 at "IEEE Transactions on Computers"
DOI: 10.1109/tc.2018.2833119
Abstract: Although postquantum cryptography is of growing practical concern, not many works have been devoted to implementation security issues related to postquantum schemes. In this paper, we look in particular at fault attacks against implementations of…
read more here.
Keywords:
exchange protocols;
key exchange;
lattice based;
signature schemes ... See more keywords