搜索结果: 1-5 共查到“军事学 man-in-the-middle”相关记录5条 . 查询时间(0.108 秒)
Two-Round Man-in-the-Middle Security from LPN
Secret-key authentication Man-in-the-Middle security LPN
2016/1/27
Secret-key authentication protocols have recently received a
considerable amount of attention, and a long line of research has been
devoted to devising efficient protocols with security based on the...
Man-in-the-Middle Secure Authentication Schemes from LPN and Weak PRFs
authentication schemes LPN HB authentication weak-PRFs
2013/4/18
We show how to construct, from any weak pseudorandom function, a 3-round symmetric-key authentication protocol that is secure against man-in-the-middle attacks. The construction is very efficient, req...
$HB^N$: An HB-like protocol secure against man-in-the-middle attacks
cryptographic protocols authentication secret-key cryptography
2011/7/25
We construct a simple authentication protocol whose security is based solely on the problem of Learning Parity with Noise (LPN) which is secure against Man-in-the-Middle attacks.
Trusted–HB: a low-cost version of HB+ secure against Man-in-The-Middle attacks
RFID HB+ protocol Low-cost cryptography Authentication
2009/6/2
Since the introduction at Crypto’05 by Juels and
Weis of the protocol HB+, a lightweight protocol secure against
active attacks but only in a detection based-model, many works
have tried to enhance...
Man-in-the-Middle in Tunneled Authentication Protocols
Man-in-the-Middle Tunneled Authentication Protocols
2009/4/15
Recently new protocols have been proposed in the IETF for protecting remote client authentication
protocols by running them within a secure tunnel. Examples of such protocols are PIC, PEAP and
EAP-T...