作者: William M. Duane , Magnus Nyström , Peter Röstin
DOI:
关键词: Computer science 、 Computer network 、 Protocol (object-oriented programming) 、 String (computer science) 、 Cryptography 、 Encryption 、 Key (cryptography) 、 Computer security
摘要: Techniques for secure generation of a seed use in performing one or more cryptographic operations, utilizing protocol carried out by client (110c) and server (110s). The (110s) provides first string to the (110c). generates second string, encrypts key (216), sends encrypted as function at leas string. decrypts (222) independently least an