期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
基于改进的LSB视频信息隐藏方法 被引量:3
1
作者 薛帅 戴青 +1 位作者 冯东华 冯国松 《计算机应用与软件》 CSCD 2015年第1期157-160,共4页
针对传统的LSB算法易受攻击的特点,通过研究LSB嵌入过程中视频统计特征的变化,结合Diffie-Hellman密码交换协议,提出一种基于密钥交换协议的视频LSB隐藏方法。该方法利用密码交换协议产生的密钥索引来提取视频帧并确定隐藏位置,为隐藏... 针对传统的LSB算法易受攻击的特点,通过研究LSB嵌入过程中视频统计特征的变化,结合Diffie-Hellman密码交换协议,提出一种基于密钥交换协议的视频LSB隐藏方法。该方法利用密码交换协议产生的密钥索引来提取视频帧并确定隐藏位置,为隐藏视频增加了密钥验证。实验证明,该方法在具有较大隐藏容量的同时,对视频统计特征改变较小,有效提高了LSB抵抗隐写检测性能。 展开更多
关键词 视频信息隐藏 LSB 密码交换协议 密钥索引
下载PDF
STRONGER PROVABLE SECURE MODEL FOR KEY EXCHANGE
2
作者 任勇军 王建东 +1 位作者 徐大专 庄毅 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2009年第4期313-319,共7页
The key exchange is a fundamental building block in the cryptography. Several provable security models for the key exchange protocol are proposed. To determine the exact properties required by the protocols, a single ... The key exchange is a fundamental building block in the cryptography. Several provable security models for the key exchange protocol are proposed. To determine the exact properties required by the protocols, a single unified security model is essential, The eCK , eCK and CK models are examined and the result is proved that the eCK' model is the strongest provable security model for the key exchange. The relative security strength among these models is analyzed. To support the implication or non-implication relations among these models, the formal proofs and the counter-examples are given. 展开更多
关键词 network security CRYPTOGRAPHY information security key exchange protocol
下载PDF
SIDH公钥压缩中双线性对的有效计算
3
作者 朱屹霖 李梦东 王颖 《北京电子科技学院学报》 2022年第2期61-67,共7页
超奇异同源密码交换协议(SIDH)因其密钥长度短、且可以进一步对公钥进行压缩,使得SIDH协议在后量子密码领域更具竞争力。本文主要针对SIDH公钥压缩中双线性对计算这一“瓶颈”问题,在分析已有研究工作的实现过程基础上,采用预计算的方... 超奇异同源密码交换协议(SIDH)因其密钥长度短、且可以进一步对公钥进行压缩,使得SIDH协议在后量子密码领域更具竞争力。本文主要针对SIDH公钥压缩中双线性对计算这一“瓶颈”问题,在分析已有研究工作的实现过程基础上,采用预计算的方式提高公钥压缩中双线性对的计算速度。 展开更多
关键词 超奇异同源密码交换协议 公钥压缩 双线性对
下载PDF
Password-Authenticated Multiple Key Exchange Protocol for Mobile Applications 被引量:2
4
作者 Li Wenmin Wen Qiaoyan Su Qi Zhang Hua Jin Zhengping 《China Communications》 SCIE CSCD 2012年第1期64-72,共9页
To achieve privacy and authentication sinmltaneously in mobile applications, various Three-party Password-authenticated key exchange (3PAKE) protocols have been proposed. However, some of these protocols are vulnera... To achieve privacy and authentication sinmltaneously in mobile applications, various Three-party Password-authenticated key exchange (3PAKE) protocols have been proposed. However, some of these protocols are vulnerable to conventional attacks or have low efficiency so that they cannot be applied to mobile applications. In this paper, we proposed a password-authenticated multiple key exchange protocol for mobile applications using elliptic curve cryptosystem. The proposed protocol can achieve efficiency, reliability, flexibility and scalability at the same time. Compared with related works, the proposed protocol is more suitable and practical for mobile applications. 展开更多
关键词 mobile applications key exchange PASSWORD elliptic curve cryptosystem SECURITY
下载PDF
Analysis and modification of the Internet Key Exchange Protocols
5
作者 JianfanWei RenliangYuan 《信息安全与通信保密》 2005年第7期156-159,共4页
Internet Key Exchange (IKE) protocols have been becoming an important standard in VPN communications. This paper gives an analysis of identity protection flaw to the main mode of IKE protocols, and then a moditication... Internet Key Exchange (IKE) protocols have been becoming an important standard in VPN communications. This paper gives an analysis of identity protection flaw to the main mode of IKE protocols, and then a moditication suggestion is proposed to enabie IKE supporting Road Warrior users, Denial of Service (DoS) probiem that existed in IKE phase 1 is also discossed and some suggestions are given. 展开更多
关键词 INTERNET 密码交换协议 国际互联网络 密码
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部