搜索结果: 1-10 共查到“军事学 Standards”相关记录10条 . 查询时间(0.015 秒)
Post-Quantum Variants of ISO/IEC Standards: Compact Chosen Ciphertext Secure Key Encapsulation Mechanism from Isogenies
Post-quantum cryptosystems Isogeny-based cryptosystems CSIDH
2019/9/17
ISO/IEC standardizes several chosen ciphertext-secure key encapsulation mechanism (KEM) schemes in ISO/IEC 18033-2. However, all ISO/IEC KEM schemes are not quantum resilient. In this paper, we introd...
LMS vs XMSS: A comparison of the Stateful Hash-Based Signature Proposed Standards
post-quantum cryptography hash based signatures hbs
2017/4/27
Quantum computing poses challenges to public key signature schemes as we know them today. LMS and XMSS are two hash based signature schemes that have been proposed in the IETF as quantum secure. Both ...
How to manipulate curve standards: a white paper for the black hat
Elliptic-curve cryptography verifiably random curves verifiably pseudorandom curves
2016/1/8
This paper analyzes the cost of breaking ECC under the following assumptions: (1) ECC is using a standardized elliptic curve that was actually chosen by an attacker; (2) the attacker is aware of a vul...
Unpicking PLAID - A Cryptographic Analysis of an ISO-standards-track Authentication Protocol
Protocol analysis ISO standard PLAID
2016/1/7
The Protocol for Lightweight Authentication of Identity (PLAID) aims at secure and private
authentication between a smart card and a terminal. Originally developed by a unit of the Australian
Depart...
Analysis of an RFID Authentication Protocol in Accordance with EPC Standards
Security and Privacy RFID Authentication protocols
2015/12/22
In the past few years, the design of RFID authentication protocols in accordance with the EPC Class-1
Generation-2 (EPC C1 G2) standards, has been one of the most important challenges in the informat...
Fast generators for the Diffie-Hellman key agreement protocol and malicious standards
Diffie-Hellman Problem Discrete Logarithm Problem fast generators, trapdoor.
2009/2/18
The Diffie-Hellman key agreement protocol is based
on taking large powers of a generator of a prime-order cyclic group.
Some generators allow faster exponentiation. We show that to
a large extent, ...
A Cryptographic Tour of the IPsec Standards
IP IPsec network security cryptography key management
2008/11/6
In this article, we provide an overview of cryptography and cryptographic key man-
agement as they are speci¯ed in IPsec, a popular suite of standards for providing commu-
nications security an...
Attacking the IPsec Standards in Encryption-only Configurations
IPsec integrity encryption ESP
2008/9/4
At Eurocrypt 2006, Paterson and Yau demonstrated how aws in the Linux
implementation of IPsec could be exploited to break encryption-only configurations of ESP,
the IPsec encryption protocol. Their ...
Updated standards for validating elliptic curves.
elliptic curve cryptography MOV condition discrete logarithm security
2008/5/29
We give a concise statement of a test for security of elliptic curves that
should be inserted into the standards for elliptic curve cryptography.
A major security goal for signature schemes is to prevent an adver-
sary from producing new valid signatures even though he can receive
valid signatures of any messages from the legitimate signer.