Showing 1 - 20 results of 505 for search '"key agreement"', query time: 0.51s Refine Results
  1. 1

    Plactic key agreement (insecure?) by Brown Daniel R. L.

    Published 2023-02-01
    “…Plactic key agreement is a new type of cryptographic key agreement that uses Knuth’s multiplication of semistandard tableaux from combinatorial algebra. …”
    Get full text
    Article
  2. 2

    Key agreement via protocols by Roscoe, A, Wang, L

    Published 2019
    Conference item
  3. 3
  4. 4

    Mutual Dependence for Secret Key Agreement by Chan, Chung, Zheng, Lizhong

    Published 2011
    “…A mutual dependence expression is established for the secret key agreement problem when all users are active. In certain source networks, the expression can be interpreted as certain notions of connectivity and network information flow. …”
    Get full text
    Get full text
    Article
  5. 5

    Authentication and Key Agreement Protocol for UAV Communication by JIAN Qi-rui, CHEN Ze-mao, WU Xiao-kang

    Published 2022-08-01
    Subjects: “…unmanned aerial vehicle|mutual authentication|key agreement|communication security|security protocol|formal verification…”
    Get full text
    Article
  6. 6
  7. 7

    Conference key agreement in a quantum network by Alexander Pickston, Joseph Ho, Andrés Ulibarrena, Federico Grasselli, Massimiliano Proietti, Christopher L. Morrison, Peter Barrow, Francesco Graffitti, Alessandro Fedrizzi

    Published 2023-08-01
    “…Abstract Quantum conference key agreement (QCKA) allows multiple users to establish a secure key from a shared multi-partite entangled state. …”
    Get full text
    Article
  8. 8

    Cryptanalysing variants of Stickel's key agreement scheme by Mullan Ciaran

    Published 2011-04-01
    “…Stickel's key agreement scheme was successfully cryptanalysed by V. …”
    Get full text
    Article
  9. 9
  10. 10

    Automated verification of group key agreement protocols by Schmidt, B, Sasse, R, Cremers, C, Basin, D

    Published 2014
    “…We implement the algorithm in the TAMARIN prover and provide the first symbolic correctness proofs for group key agreement protocols that use Diffie-Hellman or bilinear pairing, loops, and recursion, while at the same time supporting advanced security properties, such as perfect forward secrecy and eCK-security. …”
    Conference item
  11. 11
  12. 12

    Anonymous conference key agreement in linear quantum networks by Jarn de Jong, Frederik Hahn, Jens Eisert, Nathan Walk, Anna Pappa

    Published 2023-09-01
    “…Among them, conference key agreement (CKA) - an extension of key distribution to multiple parties - has received much attention recently. …”
    Get full text
    Article
  13. 13

    An Improved Key Agreement Protocol Based on Fractal Theory by Nadia M. G. Al-Saidi

    Published 2014-01-01
    Subjects: “…key agreement…”
    Get full text
    Article
  14. 14

    Three-party authenticated key agreements for optimal communication. by Tian-Fu Lee, Tzonelih Hwang

    Published 2017-01-01
    “…Authenticated key agreements enable users to determine session keys, and to securely communicate with others over an insecure channel via the session keys. …”
    Get full text
    Article
  15. 15
  16. 16

    An Efficient Lightweight Key Agreement and Authentication Scheme for WBAN by Zia Ur Rehman, Saud Altaf, Saleem Iqbal

    Published 2020-01-01
    “…Hence, the researchers present a lightweight cryptographic scheme based on three levels that provide anonymous key agreement and authentication for the data communicated on the wireless channel. …”
    Get full text
    Article
  17. 17
  18. 18
  19. 19

    Key Agreement Scheme Based on Ocean Acoustic Channel by LIANG Zhen-zhen, XU Ming

    Published 2022-06-01
    Subjects: “…key agreement|privacy amplification|underwater acoustic channel|active attack|toeplitz matrix…”
    Get full text
    Article
  20. 20