搜索结果: 1-7 共查到“军事学 Rekeying”相关记录7条 . 查询时间(0.078 秒)
Weak Keys in the Rekeying Paradigm: Attacks on COMET-128 and mixFeed
weak keys authenticated encryption comet
2019/8/6
In this article, we analyze two of the NIST Round 1 Candidates for the Lightweight Cryptography Standardization Process: COMET and mixFeed. We show how AEAD modes that are based on rekeying can be mod...
Exclusive Key-Based Group Rekeying
applications / multicast key distribution group rekeying, 1-resilient
2012/3/21
Group rekeying protocols are intended to support private group communications for large and dynamic groups. Given a group of users, an exclusive key for a user i is a key shared by all users in this g...
Exclusive Key-Based Group Rekeying
applications / multicast key distribution group rekeying 1-resilient
2012/3/23
Group rekeying protocols are intended to support private group communications for large and dynamic groups. Given a group of users, an exclusive key for a user i is a key shared by all users in this g...
Exclusive Key-Based Group Rekeying
applications / multicast key distribution group rekeying 1-resilient
2012/3/23
Group rekeying protocols are intended to support private group communications for large and dynamic groups. Given a group of users, an exclusive key for a user i is a key shared by all users in this g...
Homomorphic One-Way Function Trees and Application in Collusion-Free Group Rekeying
Group rekeying One-way function tree Homomorphism Collusion
2010/8/17
Efficient group rekeying is an important building-block for secure group communications. Although Sherman et al. claimed that their group rekeying scheme, OFT (One-way Function Tree) achieves perfect ...
Tree Parity Machine Rekeying Architectures
K.4.4.f Security K.6.5.a Authentication B.7.1.b Algorithms implemented in hardware
2009/3/27
The necessity to secure the communication between hardware components in embedded systems
becomes increasingly important with regard to the secrecy of data and particularly its commercial use.
We su...
Tree Parity Machine Rekeying Architectures for Embedded Security
Tree Parity Machine Rekeying Architectures Embedded Security pervasive computing
2009/2/19
Tree Parity Machine Rekeying Architectures for Embedded Security.