Performance evaluation of a new hybrid encryption protocol for authentication and key distribution

被引:0
|
作者
El-Hadidi, M.T. [1 ]
Hegazi, N.H. [1 ]
Aslan, H.K. [1 ]
机构
[1] Cairo Univ, Cairo, Egypt
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:16 / 22
相关论文
共 50 条
  • [31] An effective attack on the quantum key distribution protocol based on quantum encryption
    Gao, F
    Qin, SJ
    Wen, QY
    Zhu, FC
    INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS, 2005, 3822 : 302 - 312
  • [32] A Hybrid-key Based Image Encryption and Authentication Scheme with the Use of Ergodic Matrix
    Zhou, Xiaoyi
    Ma, Jixin
    Du, Wencai
    Zhao, Yongzhe
    2ND INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2010), VOLS 1 AND 2, 2010, : 212 - 217
  • [33] Text Multilevel Encryption Using New Key Exchange Protocol
    Khudhair, Zaid Nidhal
    Nidhal, Ahmed
    El Abbadi, Nidhal K.
    BAGHDAD SCIENCE JOURNAL, 2022, 19 (03) : 619 - 630
  • [34] A key distribution scheme for Double Authentication in link state routing protocol
    Huang, DJ
    Sinha, A
    Medhi, D
    CONFERENCE PROCEEDINGS OF THE 2005 IEEE INTERNATIONAL PERFORMANCE, COMPUTING AND COMMUNICATIONS CONFERENCE, 2005, : 19 - 24
  • [35] A New Mutual Authentication and Key Agreement Protocol for Mobile Communications
    Zhang, Juan
    Chen, Guang-hui
    Deng, Fang-min
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 9096 - +
  • [36] A Secure Lightweight Protocol for SMS Mutual Authentication Protocols Based on Symmetic-Key Encryption
    Thammarat, Chalee
    Kurutach, Werasak
    Phoomvuthisam, Suronapee
    2017 17TH INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES (ISCIT), 2017,
  • [37] A New Lightweight Authentication and Key agreement Protocol For Internet of Things
    Arasteh, Sima
    Aghili, Seyed Farhad
    Mala, Hamid
    2016 13TH INTERNATIONAL IRANIAN SOCIETY OF CRYPTOLOGY CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2016, : 52 - 59
  • [38] AUTHENTICATION OF SIGNATURES USING PUBLIC KEY ENCRYPTION
    BOOTH, KS
    COMMUNICATIONS OF THE ACM, 1981, 24 (11) : 772 - 774
  • [39] Parallel authentication and public-key encryption
    Pieprzyk, J
    Pointcheval, D
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2003, 2727 : 387 - 401
  • [40] Network Authentication Based on Secret Key Encryption
    Hu, Xiangyi
    Zhao, Guifen
    2008 INTERNATIONAL WORKSHOP ON INFORMATION TECHNOLOGY AND SECURITY, 2008, : 51 - 55