搜索结果: 1-15 共查到“军事学 B-factor”相关记录32条 . 查询时间(0.109 秒)
HMAKE: Legacy-Compliant Multi-factor Authenticated Key Exchange from Historical Data
Historical Data Authentication Authenticated Key Exchange
2019/5/9
In this paper, we introduce two lightweight historical data based multi-factor authenticated key exchange (HMAKE) protocols in the random oracle model. Our HMAKE protocols use a symmetric secret key, ...
Minimizing Trust in Hardware Wallets with Two Factor Signatures
digital signatures threshold cryptography
2019/1/9
We introduce the notion of two-factor signatures (2FS), a generalization of a two-out-of-two threshold signature scheme in which one of the parties is a hardware token which can store a high-entropy s...
Two-Factor Authentication with End-to-End Password Security
password authentication two-factor authentication short authenticated string model
2018/1/11
We present a secure two-factor authentication (TFA) scheme based on the possession by the user of a password and a crypto-capable device. Security is ``end-to-end" in the sense that the attacker can a...
PROVABLY SECURE TWO-FACTOR AUTHENTICATION SCHEME FOR E-HEALTH USING SMART CARD
elliptic curve cryptosystem smart cards hash functions
2017/6/6
Nowadays, IT enabled service gain more attention due to easy to access resources from remote place. IT enabled services are extend their service to all kind of business and personal related applicatio...
A Novel Multi-factor ID-based Designated Verifier Signature scheme
cryptographic protocols digital signatures
2016/12/24
In a classic digital signature scheme, the global community is capable of verifying a signature. In a designated verifier scheme (DVS), only the designated verifier has this capability. In a classic D...
Moderate dietary fat consumption as a risk factor for ischemic heart disease in a population with a low fat intake: a case-control study in Korean men
Republic of Korea men case-control study
2016/6/13
Dietary fat intake is associated with the incidence
of ischemic heart disease (IHD) in Western countries. In populations
in which both the average dietary fat consumption and the
incidence of IHD a...
Tightly-Secure Pseudorandom Functions via Work Factor Partitioning
Tight security pseudorandom functions provable security
2016/2/23
We introduce a new technique for tight security proofs called work
factor partitioning. Using this technique in a modified version of the framework
of Dottling and Schr ¨ oder (CRYPTO 2015), we obta...
Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment
Two-factor authentication User anonymity Smart card
2016/1/25
Despite two decades of intensive research, it remains a challenge to design a practical anonymous two-factor authentication
scheme, for the designers are confronted with an impressive list of securit...
Cryptanalysis and Improvement on Robust Three-Factor Remote User Authentication Scheme with Key Agreement for Multimedia System
cryptographic protocols Authentication scheme
2016/1/9
A three-factor authentication combines biometrics information with user password and smart card to provide security-enhanced user authentication. An proposed user authentication scheme improved Das’s ...
We show how to realize two-factor authentication for a Bitcoin wallet
employing the two-party ECDSA signature protocol adapted from MacKenzie
& Reiter (2004). We also present a prototypic implementa...
Physical functions : the common factor of side-channel and fault attacks ?
Differential Power Analysis Differential Fault Analysis
2016/1/6
Security is a key component for information technologies and
communication. Among the security threats, a very important one is
certainly due to vulnerabilities of the integrated circuits that imple...
A Simple Method for Obtaining Relations Among Factor Basis Elements for Special Hyperelliptic Curves
hyperelliptic curves index calculus algorithm Nagao’s decomposition
2016/1/3
Nagao had proposed a decomposition method for divisors of hyperelliptic curves defined over a field \rFqn with n≥2. Joux and Vitse had later proposed a variant which provided relations among the facto...
M-MAP: Multi-Factor Memory Authentication for Secure Embedded Processors
Secure Processor Memory Safety Authentication
2015/12/23
The challenges faced in securing embedded computing systems against multifaceted memory
safety vulnerabilities have prompted great interest in the development of memory safety countermeasures.
These...
Factor Base Discrete Logarithms in Kummer Extensions
Discrete logarithm Finite fields Kummer extension
2015/12/23
The discrete logarithm over finite fields of small characteristic can be solved much more efficiently than previously thought. This algorithmic breakthrough is based on heuristic polynomial time algor...
On the Usability of Two-Factor Authentication
Two-factor authentication Usability User anonymity
2015/12/21
Smart-card-based password authentication, known as twofactor
authentication, is one of the most widely used security mechanisms
to validate the legitimacy of a remote client, who must hold a valid s...