搜索结果: 1-8 共查到“数据安全与计算机安全 Key”相关记录8条 . 查询时间(0.25 秒)
On the indifferentiability of key-alternating ciphers
Even-Mansour ideal cipher key-alternating cipher indif- ferentiability
2016/1/23
The Advanced Encryption Standard (AES) is the most widely used block cipher. The high level structure of AES can be viewed as a (10-round) key-alternating cipher, where a t-round key-alternating ci-ph...
Field Test of Measurement-Device-Independent Quantum Key Distribution
Field test Measurement-Device-Independent Quantum Key Distribution Automatic Feedback Systems
2016/1/22
A main type of obstacles of practical applications of quantum key distribution (QKD) network is various attacks on detection. Measurement-device-independent QKD (MDIQKD)protocol is immune to all these...
Experimental Passive Decoystate Quantum Key Distribution
quantum key distribution passive decoy-state parametric down conversion
2016/1/22
The decoy-state method is widely used in practical quantum key distribution systems to replace ideal single photon sources with realistic light sources of varying intensities. Instead of active modula...
Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes
block ciphers key-length extension provable security ideal-cipher model
2016/1/22
We revisit the security (as a pseudorandom permutation) of cascading-based constructions for block-cipher key-length extension. Pre-vious works typically considered the extreme case where the adversar...
Key-Alternating Ciphers in a Provable Setting:Encryption Using a Small Number of Public Permutations
Block ciphers provable security Even-Mansour construction
2011/11/9
This paper considers—for the first time—the concept of keyalternating ciphers in a provable security setting. Key-alternating ciphers can be seen as a generalization of a construction proposed by Even...
基于Key值更新随机Hash锁的RFID隐私保护研究
认证协议 随机Hash锁 位置隐私
2009/7/21
在当前已有基于Hash函数增强RFID安全性的方法基础上,利用基于挑战-响应方式互相认证协议最小形式,针对已有的Key值更新随机Hash锁泄漏位置隐私的安全威胁,提出了一种改进的RFID互相认证方法。该方法弥补了已有研究的不足,对标签的响应增加了随机性,可以更好地应对位置隐私泄漏的威胁。
基于USB key的零知识证明双向认证方案
零知识证明 身份认证 公钥认证
2009/7/21
基于USB key和零知识证明思想,构造一种双向交互认证方案,不仅实现了对用户的身份认证,而且实现了对用户的公钥认证。分析表明,该方案具有安全性高,计算复杂性低的特点。