About 397 results
Open links in new tab
  1. Feb 6, 2023 · TLS is supported by all network functions in the 5G architecture in service-based interface, while IKEv2 is used to establish a shared secret in non-service-based interface

  2. noticeable fraction of today’s Internet communication—Alice and Bob need to perform some computation and send some data but do not need any new hardware. Quantum cryptography …

  3. Multivariate-quadratic-equations public-key cryptography

    Applied cryptography and network security, 6th international conference, ACNS 2008, New York, NY, USA, June 3-6, 2008, proceedings. Lecture Notes in Computer Science 5037.

  4. Mar 10, 2025 · The Authorization Network virtually connects the authentication and authorization systems and identity verification sources of participating organizations and neutral service …

  5. Feb 11, 2025 · Another approach is to support both quantum-resistant and quantum-vulnerable algorithms to permit interoperability with other organizations still moving away from legacy …

  6. Jul 30, 2024 · Some IETF drafts on hybrid mode NIST communicate with IETF through participations IEEE-SA IEEE P 1943 Standard for Post-Quantum Network Security IEEE …

  7. Jan 5, 2023 · Pervasive network connection and information flow Security must be the first consideration Security proof adds confidence but should not be the solely considered criteria …

  8. Hash-based public-key cryptography

    Applied Cryptography and Network Security, 5th international conference, ACNS 2007, Zhuhai, China, June 5–8, 2007, proceedings. Lecture Notes in Computer Science 4521.

  9. Feb 6, 2023 · Quantum Key Distribution Using quantum mechanics to enable two parties to share a random secret key It can solve key distribution problem when quantum interface is available …

  10. Feb 6, 2023 · Public-key cryptography has been used in network protocols to establish symmetric keys and also to conduct mutual authentication such as in Internet Key Exchange (IKE) …