Aegis Sample Clauses
The 'Aegis' clause serves as a protective provision within a contract, designed to shield one or more parties from specific risks or liabilities. In practice, this clause may outline the circumstances under which a party is indemnified or held harmless, such as in cases of third-party claims or unforeseen damages. By clearly defining the scope and limitations of protection, the Aegis clause helps allocate risk and provides assurance to the protected party, thereby reducing potential disputes and fostering confidence in the contractual relationship.
Aegis. A new Section 2.2(l) of the Loan Agreement is hereby added as follows:
Aegis. AEGIS [28] is a cryptographic technique belong- ing to the category of authenticated encryption with associated data (AEAD). Its design is tailored to suit resource-limited devices as well as high-performance computing applications. Its unique features include its lightweight, robustness, inverse- free and online nature. The encryption process of AEGIS can be symbolically expressed as follows: {CTi, MACi} = EK(IV, AD, PTi), where CTi stands for the resulting ciphertext, MACi is the authentication tag, IV represents the initialization vector, AD refers to the associated data, K denotes the shared key, and TABLE I: Notations and descriptions Notation Description TA trusted registration authority Ui ith user device U Di, M CNj, SDk ith user device, jth MCN, kth smart sensing IDi, P Wi Identity and password of user Ui SIDe, SPe ▇▇▇▇▇▇▇▇▇▇▇▇ identity and secret parameter of the communication entity e ▇▇▇▇, ▇▇▇▇ Current and previous pseudonymous identities ri ith random number utilized in AKA phase Xj The jth intermediate result computed during AKA phase Na, Nb Two parts obtained by equally dividing notation The ith initialization vector, associated data and PTi represents the plaintext to be encrypted. Additionally, the decryption process of AEGIS is described as follows: ▇▇▇, ADi, P Ti plaintext used in the AKA phase The ith ciphertext and its corresponding authen- {PT , ⊥} = D (IV, AD, CT , MAC )
i i tication Tag in AKA phase
i K i i ith timestamps utilized in AKA phase Specifically, in the decryption process, AEGIS takes as input the (CTi, MACi) pair generated during encryption, along with (IV, AD, K), and computes a new authentication tag Ti∗ (Ce, Re) ith timestamps upon message receipt Challenge-response pair of the communication entity e MAC′ based on the received (IV, AD, K, CTi) through the decryption function. It then verifies whether MAC′ = MAC . If the verification of MACi fails, an error is triggered; Otherwise, the plaintext PTi is retrieved. These features make AEGIS an ideal primitive for our scheme, as it simplifies the authentication scheme, reduces complexity and enhances the overall security of the system.
Aegis. 9.1.1 Aegis will comply, and will contractually require any and all Contract Manufacturers to comply, with all present and future Laws applicable to the manufacture and supply of Materials, including, without limitation, applicable GMP or other regulations promulgated from time to time by the FDA, defect notifications, and any other registration requirements that may be imposed on the manufacture of Materials. Aegis represents and warrants to Opiant that all Materials supplied hereunder shall: (a) be manufactured, tested, labeled, packaged, stored, handled, and shipped in conformance with GMP and all applicable Laws; (b) be manufactured, tested, labeled, packaged, stored, handled, and shipped in conformance with the applicable Specifications; (c) be free and clear of all liens, security interests and other encumbrances; and (d) have a shelf life of not less than three (3) years at the time delivered to Opiant or its designee. Confidential Treatment has been requested for portions of this exhibit. The copy filed herewith omits the information subject to the confidentiality request. Omissions are designated as “****”. A complete version of this exhibit has been filed separately with the Securities and Exchange Commission.
9.1.2 Aegis represents, warrants, and covenants to Opiant that: (a) Aegis holds and will hold, and is operating and will operate in compliance with, any and all exceptions, permits, licenses, franchises, authorizations and clearances of the FDA and/or any other governmental authority required in connection with the development to date of the Excipient(s), (b) Aegis is not debarred or suspended under 21 U.S.C. §335(a) or (b) or comparable Laws in any other jurisdiction; (c) there are no actual or, to Aegis’ knowledge, threatened enforcement actions by the FDA or any other federal, state, or foreign Regulatory Authority which has jurisdiction over Aegis’ operations or products, including, without limitation, any fines, injunctions civil or criminal penalties, investigations, debarments, or suspensions; (d) Aegis has not received any warning letters or written correspondence from the FDA and/or any other governmental authority requiring the termination, suspension or modification of any clinical or pre-clinical studies or tests with respect to the Excipient(s); and (e) as of the Effective Date, there are no actual or, to the knowledge of Aegis, threatened enforcement actions relating to any Excipient by the FDA or any other governmental author...
