搜索结果: 1-15 共查到“军队指挥学 Password-based”相关记录30条 . 查询时间(0.078 秒)
PASTA: PASsword-based Threshold Authentication
passwords token-based authentication threshold cryptography
2018/11/13
Token-based authentication is commonly used to enable a single-sign-on experience on the web, in mobile applications and on enterprise networks using a wide range of open standards and network authent...
Efficient Implementation of Password-Based Authenticated Key Exchange from RLWE and Post-Quantum TLS
Authenticated Key Exchange Implementation Post-quantum
2017/12/19
Two post-quantum password-based authenticated key exchange (PAKE) protocols were proposed at CT-RSA 2017. Following this work, we give much more efficient and portable C++ implementation of these two ...
Partitioned Group Password-Based Authenticated Key Exchange
group password authenticated key exchange password privacy
2017/2/21
Group Password-Based Authenticated Key Exchange (GPAKE) allows a group of users to establish a secret key, as long as all of them share the same password. However, in existing GPAKE protocols as soon ...
Per-Session Security: Password-Based Cryptography Revisited
password-based encryption simulation-based security random oracle
2016/2/22
Cryptographic security is usually defined as some form of guarantee that holds except
when a bad event with negligible probability occurs, and nothing is guaranteed in that case. However,
in setting...
Lyra: Password-Based Key Derivation with Tunable Memory and Processing Costs
Password-based key derivation memory usage cryptographic sponges
2016/1/26
We present Lyra, a password-based key derivation scheme
based on cryptographic sponges. Lyra was designed to be strictly sequential
(i.e., not easily parallelizable), providing strong security even ...
The M3lcrypt Password Based Key Derivation Function
applications Password Based Key Derivation Function
2016/1/23
M3lcrypt (canonical M3lcryptH) is a password based key derivation function built around the Merkle-Damgard hash function H. It supports large [pseudo]random salt values ( 128-bit) and password length...
Mitigating Server Breaches in Password-Based Authentication: Secure and Efficient Solutions
Password-Authenticated Key Exchange Distributed Computation Decision Diffie-Hellman
2015/12/21
Password-Authenticated Key Exchange allows users to generate a strong cryptographic key based
on a shared 揾uman-memorable?password without requiring a public-key infrastructure. It is one of the most...
Adaptive Witness Encryption and Asymmetric Password-based Cryptography
Passwords witness encryption
2014/3/6
This paper defines adaptive soundness (AS) security for witness encryption and applies it to provide the first non-invasive schemes for asymmetric password-based encryption (A-PBE). A-PBE offers signi...
Partially blind password-based signatures using elliptic curves
digital signatures Nyberg-Rueppel
2014/3/11
Password-based signatures allow a user who can only remember a password to create digital signatures with the help of a server, without revealing the messages to be signed to the server.
Certain appl...
Efficient Password-Based Authenticated Key Exchange from Lattices
public-key cryptography lattice PAKE
2012/6/14
Protocols for password-based authenticated key exchange (PAKE) allow two users who share only a short, low-entropy password to agree on a cryptographically strong session key. One must ensure that pro...
Efficient Password-Based Authenticated Key Exchange from Lattices
public-key cryptography / lattice PAKE
2012/3/22
Protocols for password-based authenticated key exchange (PAKE) allow two users who share only a short, low-entropy password to agree on a cryptographically strong session key. One must ensure that pro...
Efficient Password-Based Authenticated Key Exchange from Lattices
public-key cryptography / lattice PAKE
2012/3/21
Protocols for password-based authenticated key exchange (PAKE) allow two users who share only a short, low-entropy password to agree on a cryptographically strong session key. One must ensure that pro...
Relatively-Sound NIZKs and Password-Based Key-Exchange
NIZKs Relatively-Sound Key-Exchange
2012/3/26
We define a new notion of relatively-sound non-interactive zero-knowledge (NIZK) proofs, where a private verifier with access to a trapdoor continues to be sound even when the Adversary has access to ...
We show a general framework for constructing password-based authenticated key exchange protocols with optimal round complexity --- one message per party, sent simultaneously --- in the standard model,...
Improvements on two password-based authentication protocols
smart card password authentication protocol password change
2009/12/29
Recently, Liao et al. and Hölbl et al. each proposed a user authentication protocol,
respectively. Both claimed that their schemes can withstand various attacks. However,
Xiang et al. pointed o...