搜索结果: 1-15 共查到“军事学 Password”相关记录122条 . 查询时间(0.093 秒)
Separating Standard and Asymmetric Password-Authenticated Key Exchange
PAKE Password-Authenticated Key Exchange
2019/9/23
Password-Authenticated Key Exchange (PAKE) is a method to establish cryptographic keys between two users sharing a low-entropy password. In its asymmetric version, one of the users acts as a server an...
We introduce the notion of Ticket-Mediated Password Strengthening (TMPS), a technique for allowing users to derive keys from passwords while imposing a strict limit on the number of guesses of their p...
Password-Authenticated Public-Key Encryption
Password Authenticated Key Exchange Universal Composability Public Key Encryption
2019/3/1
We introduce password-authenticated public-key encryption (PAPKE), a new cryptographic primitive. PAPKE enables secure end-to-end encryption between two entities without relying on a trusted third par...
PASTA: PASsword-based Threshold Authentication
passwords token-based authentication threshold cryptography
2018/11/13
Token-based authentication is commonly used to enable a single-sign-on experience on the web, in mobile applications and on enterprise networks using a wide range of open standards and network authent...
An Isogeny-Based Password-Authenticated Key Establishment Protocol
isogeny-based cryptography password-authenticated key establishment
2018/11/13
Password authenticated key establishment (PAKE) is a cryptographic primitive that allows two parties who share a low-entropy secret (a password) to securely establish cryptographic keys in the absence...
Your Culture is in Your Password: An Analysis of a Demographically-diverse Password Dataset
contextually relevant information non-English speaking backgrounds
2018/11/12
A large number of studies on passwords make use of passwords leaked by attackers who compromised online services. Frequently, these leaks contain only the passwords themselves, or basic information su...
User Study on Single Password Authentication
Password authentication usability two-factor authentication
2018/11/6
Single password authentication (SPA) schemes are introduced to overcome the challenges of traditional password authentications, which are vulnerable to offline dictionary, phishing, honeypot, and man-...
Password managers (aka stores or vaults) allow a user to store and retrieve (usually high-entropy) passwords for her multiple password-protected services by interacting with a "device" serving the rol...
How to (not) share a password: Privacy preserving protocols for finding heavy hitters with adversarial behavior
passwords secure computation differential privacy, heavy hitters
2018/1/12
Bad choices of passwords were and are a pervasive problem. Most password alternatives (such as two-factor authentication) may increase cost and arguably hurt the usability of the system. This is of sp...
Two-Factor Authentication with End-to-End Password Security
password authentication two-factor authentication short authenticated string model
2018/1/11
We present a secure two-factor authentication (TFA) scheme based on the possession by the user of a password and a crypto-capable device. Security is ``end-to-end" in the sense that the attacker can a...
Efficient Implementation of Password-Based Authenticated Key Exchange from RLWE and Post-Quantum TLS
Authenticated Key Exchange Implementation Post-quantum
2017/12/19
Two post-quantum password-based authenticated key exchange (PAKE) protocols were proposed at CT-RSA 2017. Following this work, we give much more efficient and portable C++ implementation of these two ...
Secure Remote Password (SRP) protocol is an augmented Password-based Authenticated Key Exchange (PAKE) protocol based on discrete logarithm problem (DLP) with various attractive security features. Com...
A practical, perfectly secure password scheme in the bounded retrieval model
secret-key cryptography bounded retrieval model
2017/9/25
In this paper, we present a practical password scheme due to Spilman, which is perfectly secure in the bounded retrieval model, assuming ideal hash functions. The construction is based on a hash-like ...
Zero-Knowledge Password Policy Check from Lattices
zero-knowledge password policy check set membership proof lattice-based cryptography
2017/9/13
Passwords are ubiquitous and most commonly used to authenticate users when logging into online services. Using high entropy passwords is critical to prevent unauthorized access and password policies e...
The TypTop System: Personalized Typo-tolerant Password Checking
Password typo-tolerant password
2017/8/30
Password checking systems traditionally allow login only if the correct password is submitted. Recent work on typo-tolerant password checking suggests that usability can be improved, with negligible s...