Diffie–Hellman key exchange

Results: 233



#Item
121Elliptic curve cryptography / Cryptographic protocols / Key size / Diffie–Hellman key exchange / Elliptic curve / Elliptic Curve DSA / Whitfield Diffie / ECC patents / Elliptic curve Diffie–Hellman / Cryptography / Finite fields / Public-key cryptography

A Public-Key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography David J. Malan, Matt Welsh, Michael D. Smith Division of Engineering and Applied Sciences Harvard University {malan,mdw,smit

Add to Reading List

Source URL: www.eecs.harvard.edu

Language: English - Date: 2004-08-24 12:30:22
122Internet Key Exchange / Diffie–Hellman key exchange / Elliptic curve cryptography / Hellman / Key size / Request for Comments / XTR / Oakley protocol / Cryptography / Cryptographic protocols / Finite fields

Internet Engineering Task Force (IETF) Request for Comments: 5903 Obsoletes: 4753 Category: Informational ISSN: [removed]

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2010-06-11 19:22:25
123Public-key cryptography / Computational hardness assumptions / BLS / Diffie–Hellman problem / Digital signature / XTR / Parity of a permutation / Diffie–Hellman key exchange / Structure / Cryptography / Finite fields / Cryptographic protocols

Boneh et al.’s k-Element Aggregate Extraction Assumption Is Equivalent to The Diffie-Hellman Assumption Jean-Sebastien Coron and David Naccache Gemplus Card International 34, rue Guynemer, Issy-les-Moulineaux, F-92447,

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
124Learning with errors / Machine learning / Diffie–Hellman key exchange / Transport Layer Security / XTR / Transmission Control Protocol / Onion routing / RSA / Cryptography / Cryptographic protocols / Electronic commerce

Post-Quantum Secure Onion Routing (Future Anonymity in Today’s Budget) Satrajit Ghosh† † Aniket Kate‡

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-06 03:15:24
125Password-authenticated key agreement / Password / Diffie–Hellman key exchange / Man-in-the-middle attack / IEEE P1363 / XTR / Password Authenticated Key Exchange by Juggling / Cryptographic protocols / Cryptography / SPEKE

The SPEKE Protocol Revisited Feng Hao, Siamak F. Shahandashti Newcastle University, UK {feng.hao, siamak.shahandashti}@ncl.ac.uk Abstract. The SPEKE protocol is commonly considered one of the classic Password Authentica

Add to Reading List

Source URL: homepages.cs.ncl.ac.uk

Language: English - Date: 2014-09-25 17:19:13
126Key management / Quantum key distribution / Cryptographic protocols / Quantum computer / Id Quantique / Diffie–Hellman key exchange / Key distribution / RSA / Whitfield Diffie / Cryptography / Quantum cryptography / Quantum information science

Encryption Product Portfolio [removed]Encryption Product Portfolio

Add to Reading List

Source URL: ec.europa.eu

Language: English - Date: 2013-06-06 03:19:32
127Computing / Internet protocols / Secure communication / Internet standards / Password / TLS-SRP / Man-in-the-middle attack / Public-key cryptography / Diffie–Hellman key exchange / Cryptography / Cryptographic protocols / Security

Replacing passwords on the Internet AKA post-Snowden Opportunistic Encryption Ben Laurie Google, Inc. Ian Goldberg

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
128Elliptic curve cryptography / NSA Suite B Cryptography / Key / Public-key cryptography / Diffie–Hellman key exchange / Ephemeral key / Static key / Cryptography / Key management / Elliptic curve Diffie–Hellman

Microsoft Word - SuiteB_Implementer_G#[removed]doc

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2009-09-22 08:04:55
129Diffie–Hellman key exchange / Elliptic curve Diffie–Hellman / Cryptography / Cryptographic protocols / Public-key cryptography

How Secure is TextSecure? Tilman Frosch Christian Mainka Florian Bergsma J¨org Schwenk Christoph Bader Thorsten Holz

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-11-05 07:33:28
130Diffie–Hellman key exchange / Public-key cryptography / Key generation / Key authentication / Algorithm / Key / Cryptography / Key management / Cryptographic protocols

An Ecient Secure Authenticated Group Key Exchange Algorithm for Large and Dynamic Groups Jim Alves-Foss Center for Secure and Dependable Software University of Idaho

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
UPDATE