搜索结果: 1-15 共查到“军事学 ET-1”相关记录32条 . 查询时间(0.078 秒)
Defeating the Hart et al, Beullens-Blackburn, Kotov-Menshov-Ushakov, and Merz-Petit Attacks on WalnutDSA(TM)
WalnutDSA Group-Theoretic Cryptography Digital Signatures
2019/5/13
The Walnut Digital Signature Algorithm (WalnutDSA) brings together methods in group theory, representation theory, and number theory, to yield a public-key method that provides a means for messages to...
Security Analysis of Fan et al. Lightweight RFID Authentication Protocol for Privacy Protection in IoT
RFID IoT Secret disclosure
2018/5/2
The designers of Radio-Frequency IDentification (RFID) systems have a challenging task for proposing secure mutual authentication protocols for Internet of Things (IoT) applications. Recently, Fan et ...
Cryptanalysis of Wang et al’s Certificateless Signature Scheme without Bilinear Pairings
cryptographic protocols CLS
2017/3/6
In these years, the design of certificateless signature (CLS) scheme without bilinear pairings has been thoroughly investigated owing to its effectiveness on solving the key escrow problem in identity...
Analysis of Gong et al.'s CCA2-Secure Homomorphic Encryption
additive homomorphic encryption adaptive chosen ciphertext attack malleability
2016/1/27
It is a well-known result that homomorphic encryption is not secure against adaptive chosen
ciphertext attacks (CCA2) because of its malleability property. Very recently, however, Gong et al. propose...
On the (im)possibility of receiving security beyond 2^l using an l-bit PRNG: the case of Wang et. al. protocol
RFID EPC-C1-G2 Authentication
2015/12/31
Recently,Wang et al. analyzed the security of two EPC C1-G2 compliant RFID authentication
protocols, called RAPLT and SRP +, and proved that these protocols are vulnerable
against de-synchronization...
Security Analysis of Niu et al. Authentication and Ownership Management Protocol
RFID ownership transfer ownership delegation
2015/12/29
Over the past decade, besides authentication, ownership management protocols have been suggested to transfer or delegate the ownership of RFID tagged items. Recently, Niu et al. have proposed an authe...
Cryptanalysis and Improvement of Akleylek et al.'s cryptosystem
public-key cryptography Cryptography Cryptanalysis ElGamal Cryptosystem, Knapsack problem
2013/2/21
Akleylek et al. [S. Akleylek, L. Emmungil and U. Nuriyev, A Modified Algorithm for Peer-to-Peer Security, journal of Appl. Comput. Math., Vol. 6(2), pp.258-264, 2007.], introduced a modified algorithm...
Cryptanalysis of improved Yeh \textit{et al. }'s authentication Protocol: An EPC Class-1 Generation-2 standard compliant protocol
cryptographic protocols / RFID C-C1 G2 Mutual Authentication Secret Disclosure Tag/Reader Impersonation Traceability
2012/3/27
EPC class 1 Generation 2(or in short term EPC-C1 G2) is one of the most important standards for RFID passive tags. However, the original protocol known to be insecure. To improve the security of this ...
Cryptanalysis of Cho \textit{et al.}'s Protocol, A Hash-Based Mutual Authentication Protocol for RFID Systems
RFID Authentication Desynchronization Attack Tag Impersonation Attack
2011/7/25
Radio frequency identification systems need protocols to provide confidentiality, user privacy, mutual authentication and etc.
Cryptanalysis of Cho \textit{et al.}'s Protocol, A Hash-Based Mutual Authentication Protocol for RFID Systems
cryptographic protocols / RFID Authentication Desynchronization Attack Tag Impersonation Attack Reader Impersonation Attack
2012/3/27
Radio frequency identification systems need protocols to provide confidentiality, user privacy, mutual authentication and etc. These protocols should resist active and passive attacks such as forgery,...
Cryptanalysis of Chen \textit{et al.}'s RFID Access Control Protocol
cryptographic protocols / RFID Access Control Spoofed Reader Attack Authentication Desynchronization Attack
2012/3/28
Recently Chen \textit{et al.} have proposed a RFID access control protocol based on the strategy of indefinite-index and challenge-response. They have claimed that their protocol provides optimal loca...
Generalization of Barreto et al ID based Signcryption Scheme
ID based signcryption generalized signcryption multiple PKGs environment
2009/6/12
This paper presents an efficient and provable secure identity based
generalized signcryption scheme based on [1] which can work as signcryption
scheme, encryption scheme and signature scheme as per ...
On the Complexity of Khovratovich et.al’s Preimage Attack on EDON-R
Complexity of Khovratovich Preimage Attack EDON-R
2009/6/12
Based on the analysis made by van Oorschot andWiener for the complexity of parallel memoryless
collision search [5], we show that the memoryless meet-in-the-middle attack which is one part of the who...
Weakness of Key Predistribution Scheme Proposed by J. Dong et al.
Key predistribution Combinatorial Design Orthogonal Array
2009/6/12
A Sensor Node in Wireless Sensor Network has very limited
resources such as processing capability, memory capacity, battery power,
and communication capability. When the communication between any
t...
Cryptanalysis of Li et al.'s Identity-Based Threshold Signcryption Scheme
Threshold Signcryption Scheme Signcryption security model
2009/6/5
Signcryption is a cryptographic primitive that aims at pro-
viding confidentiality and authentication simultaneously. Recently in May
2008, a scheme for identity based threshold signcryption was pro...