搜索结果: 1-10 共查到“计算机科学技术基础学科 Key”相关记录10条 . 查询时间(0.156 秒)
On the indifferentiability of key-alternating ciphers
Even-Mansour ideal cipher key-alternating cipher indif- ferentiability
2016/1/23
The Advanced Encryption Standard (AES) is the most widely used block cipher. The high level structure of AES can be viewed as a (10-round) key-alternating cipher, where a t-round key-alternating ci-ph...
Field Test of Measurement-Device-Independent Quantum Key Distribution
Field test Measurement-Device-Independent Quantum Key Distribution Automatic Feedback Systems
2016/1/22
A main type of obstacles of practical applications of quantum key distribution (QKD) network is various attacks on detection. Measurement-device-independent QKD (MDIQKD)protocol is immune to all these...
Experimental Passive Decoystate Quantum Key Distribution
quantum key distribution passive decoy-state parametric down conversion
2016/1/22
The decoy-state method is widely used in practical quantum key distribution systems to replace ideal single photon sources with realistic light sources of varying intensities. Instead of active modula...
Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes
block ciphers key-length extension provable security ideal-cipher model
2016/1/22
We revisit the security (as a pseudorandom permutation) of cascading-based constructions for block-cipher key-length extension. Pre-vious works typically considered the extreme case where the adversar...
Factors Which Influence Key Entry Speed On Hard and Soft Keyboards: Experience, Eye Behaviors and Finger Movements
Key Entry Speed On Hard Soft Keyboards Experience Eye Behaviors Finger Movements
2014/10/22
Soft keyboards have become ubiquitous, especially with the introduction of the iPad. This study aims to determine for experienced touch typists whether there are characteristics of soft QWERTY keyboar...
Key-Alternating Ciphers in a Provable Setting:Encryption Using a Small Number of Public Permutations
Block ciphers provable security Even-Mansour construction
2012/12/4
This paper considers—for the first time—the concept of keyalternating ciphers in a provable security setting. Key-alternating ciphers can be seen as a generalization of a construction proposed by Even...
基于Key值更新随机Hash锁的RFID隐私保护研究
认证协议 随机Hash锁 位置隐私
2009/7/21
在当前已有基于Hash函数增强RFID安全性的方法基础上,利用基于挑战-响应方式互相认证协议最小形式,针对已有的Key值更新随机Hash锁泄漏位置隐私的安全威胁,提出了一种改进的RFID互相认证方法。该方法弥补了已有研究的不足,对标签的响应增加了随机性,可以更好地应对位置隐私泄漏的威胁。
基于USB key的零知识证明双向认证方案
零知识证明 身份认证 公钥认证
2009/7/21
基于USB key和零知识证明思想,构造一种双向交互认证方案,不仅实现了对用户的身份认证,而且实现了对用户的公钥认证。分析表明,该方案具有安全性高,计算复杂性低的特点。
Key值更新随机Hash锁对RFID安全隐私的加强
RFID Key值 随机Hash锁
2009/5/13
RFID无线通信的方式和无可视性读写要求带来了很多安全隐患,针对RFID技术在安全隐私方面存在的威胁,在分析几种典型的RFID安全隐私保护方法的特点和局限的基础上,提出了一种新的方法——Key值更新随机Hash锁。该方法使用单向Hash函数添加随机Hash锁,并在每次通信过程中更新标签Key值,且标签与阅读器之间的数据传输都经过了Hash加密,有效地防止了非法读取、位置跟踪、窃听、伪装哄骗、重放等...
Chapter 7. Key Digital Technologies Underpinning Content & Applications
Boxes Companions Information Retrieval Language Processing RFID
2014/3/20
The Internet emerged from efforts to support resource sharing among computer scientists. The technologies being developed to support remote collaboration, resource sharing and other aspects of researc...