DiffieHellman key exchange

Results: 25



#Item
11Public Key Cryptography Using Discrete Logarithms in Finite Fields: Algorithms, Efficient Implementation and Attacks  L. Maurits)

Public Key Cryptography Using Discrete Logarithms in Finite Fields: Algorithms, Efficient Implementation and Attacks L. Maurits)

Add to Reading List

Source URL: www.luke.maurits.id.au

Language: English - Date: 2016-04-23 00:53:29
12How Secure is TextSecure? Tilman Frosch∗† , Christian Mainka† , Christoph Bader† , Florian Bergsma† , J¨org Schwenk† , Thorsten Holz† ∗G DATA Advanced Analytics GmbH {firstname.lastname}@gdata.de

How Secure is TextSecure? Tilman Frosch∗† , Christian Mainka† , Christoph Bader† , Florian Bergsma† , J¨org Schwenk† , Thorsten Holz† ∗G DATA Advanced Analytics GmbH {firstname.lastname}@gdata.de

Add to Reading List

Source URL: www.nds.rub.de

Language: English - Date: 2016-05-24 15:16:00
13A Systematic Analysis of the Juniper Dual EC Incident Stephen Checkoway*, Shaanan Cohney†, Christina Garman‡, Matthew Green‡, Nadia Heninger†, Jacob Maskiewicz§, Eric Rescorla§, Hovav Shacham§, Ralf-Philipp We

A Systematic Analysis of the Juniper Dual EC Incident Stephen Checkoway*, Shaanan Cohney†, Christina Garman‡, Matthew Green‡, Nadia Heninger†, Jacob Maskiewicz§, Eric Rescorla§, Hovav Shacham§, Ralf-Philipp We

Add to Reading List

Source URL: dualec.org

Language: English - Date: 2016-04-15 12:48:33
14Security of the J-PAKE Password-Authenticated Key Exchange Protocol Michel Abdalla Fabrice Benhamouda

Security of the J-PAKE Password-Authenticated Key Exchange Protocol Michel Abdalla Fabrice Benhamouda

Add to Reading List

Source URL: www.normalesup.org

Language: English - Date: 2015-03-20 08:39:27
15Contact:  Jim OrmondCRYPTOGRAPHY PIONEERS RECEIVE ACM A.M. TURING AWARD

Contact: Jim OrmondCRYPTOGRAPHY PIONEERS RECEIVE ACM A.M. TURING AWARD

Add to Reading List

Source URL: awards.acm.org

Language: English - Date: 2016-03-08 10:06:12
16Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves On the Static Diffie-Hellman Problem on Elliptic Curves over Extension Fields

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves On the Static Diffie-Hellman Problem on Elliptic Curves over Extension Fields

Add to Reading List

Source URL: 2010.eccworkshop.org

Language: English - Date: 2010-10-25 19:46:00
17CERTICOM WHITEPAPER SERIES  ECC and SCADA Key Management Rob Lambert, Certicom August 2010

CERTICOM WHITEPAPER SERIES ECC and SCADA Key Management Rob Lambert, Certicom August 2010

Add to Reading List

Source URL: www.certicom.com

Language: English - Date: 2010-11-08 15:42:56
18Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice

Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice

Add to Reading List

Source URL: aaspring.com

Language: English - Date: 2015-08-21 16:58:21
191  On the Symbolic Analysis of Low-Level Cryptographic Primitives: Modular Exponentiation and the Diffie-Hellman Protocol M ARZIA B USCEMI, University of Pisa

1 On the Symbolic Analysis of Low-Level Cryptographic Primitives: Modular Exponentiation and the Diffie-Hellman Protocol M ARZIA B USCEMI, University of Pisa

Add to Reading List

Source URL: www.qatar.cmu.edu

Language: English - Date: 2004-12-05 23:21:27
20Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice

Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice

Add to Reading List

Source URL: weakdh.org

Language: English - Date: 2015-10-15 14:53:20