DiffieHellman key exchange

Results: 25



#Item
1ETH Zurich, Department of Computer Science FS 2015 Prof. Dr. Ueli Maurer Dr. Martin Hirt Sandro Coretti

ETH Zurich, Department of Computer Science FS 2015 Prof. Dr. Ueli Maurer Dr. Martin Hirt Sandro Coretti

Add to Reading List

Source URL: www.crypto.ethz.ch

Language: English - Date: 2015-05-05 08:36:37
2Theta functions and applications in cryptography Fonctions thêta et applications en cryptographie Thèse d’informatique Damien Robert1 1

Theta functions and applications in cryptography Fonctions thêta et applications en cryptographie Thèse d’informatique Damien Robert1 1

Add to Reading List

Source URL: www.normalesup.org

Language: English - Date: 2014-08-03 16:15:38
3Algorithm and Implementation Optimisation of Cryptographic Computation over Elliptic Curves (F2m ) Jean-Marc ROBERT Team DALI/LIRMM, University of Perpignan, France  Perpignan, the 30th of may 2012

Algorithm and Implementation Optimisation of Cryptographic Computation over Elliptic Curves (F2m ) Jean-Marc ROBERT Team DALI/LIRMM, University of Perpignan, France Perpignan, the 30th of may 2012

Add to Reading List

Source URL: raim2012.u-bourgogne.fr

Language: English - Date: 2012-07-16 09:25:38
4Random Channel Hopping Schemes for Key Agreement in Wireless Networks Bin Zan Marco Gruteser

Random Channel Hopping Schemes for Key Agreement in Wireless Networks Bin Zan Marco Gruteser

Add to Reading List

Source URL: www.winlab.rutgers.edu

Language: English - Date: 2011-08-05 21:36:39
5How Secure is TextSecure? Tilman Frosch∗† , Christian Mainka† , Christoph Bader† , Florian Bergsma† , J¨org Schwenk† , Thorsten Holz† ∗G DATA Advanced Analytics GmbH {firstname.lastname}@gdata.de

How Secure is TextSecure? Tilman Frosch∗† , Christian Mainka† , Christoph Bader† , Florian Bergsma† , J¨org Schwenk† , Thorsten Holz† ∗G DATA Advanced Analytics GmbH {firstname.lastname}@gdata.de

Add to Reading List

Source URL: www.ei.rub.de

Language: English - Date: 2016-05-24 15:16:00
6United States Patent [191 Chaum [54] RETURNED-VALUE BLIND SIGNATURE SYSTEMSInventor:

United States Patent [191 Chaum [54] RETURNED-VALUE BLIND SIGNATURE SYSTEMSInventor:

Add to Reading List

Source URL: www.chaum.com

Language: English - Date: 2015-05-26 20:08:21
7Master’s thesis in Mathematics  The use of elliptic curves in cryptography by  Gijsbert van Vliet

Master’s thesis in Mathematics The use of elliptic curves in cryptography by Gijsbert van Vliet

Add to Reading List

Source URL: www.math.ru.nl

Language: English - Date: 2016-04-18 16:34:53
8Proceedings  - NN - Password Authenticated Key Agreement for Contactless Smart Cards

Proceedings - NN - Password Authenticated Key Agreement for Contactless Smart Cards

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2008-07-17 01:45:53
9Abelian varieties, Theta functions and cryptography MSR presentation Damien Robert1 1

Abelian varieties, Theta functions and cryptography MSR presentation Damien Robert1 1

Add to Reading List

Source URL: www.normalesup.org

Language: English - Date: 2013-11-15 16:58:00
10Cisco IOS 15.5M Router Security Policy Integrated Services Router (ISR) 891W, 1941W, 829W FIPSNon Proprietary Security Policy Level 1 Validation

Cisco IOS 15.5M Router Security Policy Integrated Services Router (ISR) 891W, 1941W, 829W FIPSNon Proprietary Security Policy Level 1 Validation

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-06-02 15:30:24