Key Establishment. For each 1 ≤ i, j ≤ k, Xxxxx computes zi,j = j(EBj/(Uj + [αi]Vj)), and then she calculates the hash h = H(z1,1, . . . , z1,k, z2,1, . . . , z2,k, . . . , xx,0, . . . , xx,x). Similarly, for each 1 ≤ i, j ≤ k, Xxx computes zij,j = j(EAi/(Ri + [βj]Si)), and calculates the xxxx xx = X(x0x ,0, . . . , x0x ,x, z2j ,0, . . . , x0x ,x, . . . , xxx ,0, . . . , xxx ,x). ≤ ≤
Appears in 2 contracts
Samples: Static Key Agreement, www.site.uottawa.ca
Key Establishment. For each 1 ≤ i, j ≤ k, Xxxxx computes zi,j = j(EBj/(Uj j(EBj/⟨Uj + [αi]Vj)αi]Vj⟩), and then she calculates the hash h = H(z1,1, . . . , z1,k, z2,1, . . . , z2,k, . . . , xx,0, . . . , xx,x). Similarly, for each 1 ≤ i, j ≤ k, Xxx Bob computes zij,j zi′,j = j(EAi/(Ri j(EAi/⟨Ri + [βj]Si)βj]Si⟩), and calculates the xxxx xx hash h′ = X(x0x H(z1′ ,01, . . . , x0x z1′ ,xk, z2j z2′ ,01, . . . , x0x z2′ ,xk, . . . , xxx zk′ ,01, . . . , xxx zk′ ,xk). ≤ ≤
Appears in 1 contract
Samples: www.site.uottawa.ca
Key Establishment. For each 1 ≤ i, j ≤ k, Xxxxx computes zi,j = j(EBj/(Uj j(EBj/⟨Uj + [αi]Vj)αi]Vj⟩), and then she calculates the hash h = H(z1,1, . . . , z1,k, z2,1, . . . , z2,k, . . . , xx,0, . . . , xx,x). Similarly, for each 1 ≤ i, j ≤ k, Xxx computes zij,j zi′,j = j(EAi/(Ri j(EAi/⟨Ri + [βj]Si)βj]Si⟩), and calculates the xxxx xx hash h′ = X(x0x H(z1′ ,01, . . . , x0x z1′ ,xk, z2j z2′ ,01, . . . , x0x z2′ ,xk, . . . , xxx zk′ ,01, . . . , xxx zk′ ,xk). ≤ ≤
Appears in 1 contract
Samples: Static Key Agreement