Diffie–Hellman key exchange

Results: 233



#Item
131IPsec / Secure Shell / Internet Security Association and Key Management Protocol / Key-agreement protocol / Public-key cryptography / Diffie–Hellman key exchange / Transport Layer Security / Whitfield Diffie / FIPS 140 / Cryptographic protocols / Cryptography / Internet Key Exchange

Microsoft Word - ASA-SM Security Policy.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-10-17 10:33:44
132Organic chemistry / Amines / Glyphosate / Glufosinate / Diffie–Hellman key exchange / DL-Phosphinothricin / Herbicides / Chemistry / Phosphinic acids

EDIBLE BEAN AGRONOMY AND PEST MANAGEMENT RESEARCH RESULTS

Add to Reading List

Source URL: www.manitobapulse.ca

Language: English - Date: 2013-10-03 12:25:14
133Password / Secure Remote Password protocol / SPEKE / Diffie–Hellman key exchange / Public-key cryptography / Salt / PKCS / Transport Layer Security / Password manager / Cryptography / Cryptographic protocols / Password-authenticated key agreement

2nd Annual PKI Research Workshop---Pre-Proceedings Intrusion-Tolerant Password-Enabled PKI§ Xunhua Wang Commonwealth Information Security Center & Department of Computer Science

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2003-04-24 19:07:24
134Electronic commerce / Diffie–Hellman key exchange / RSA / XTR / Digital signature / Cipher / Three-pass protocol / SPEKE / Cryptography / Public-key cryptography / Cryptographic protocols

The history of Non-Secret Encryption by J H ELLIS 1. Public-key cryptography (PKC) has been the subject of much discussion in the open literature since Diffie and Hellman suggested the possibility in their paper of April

Add to Reading List

Source URL: cryptocellar.web.cern.ch

Language: English - Date: 1999-02-19 10:12:53
135Information / Internet Key Exchange / Station-to-Station protocol / IPsec / Key-agreement protocol / Internet Security Association and Key Management Protocol / Internet security / Diffie–Hellman key exchange / Online Certificate Status Protocol / Cryptographic protocols / Cryptography / Data

Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols ∗ William Aiello AT&T Labs Research

Add to Reading List

Source URL: www.crypto.com

Language: English - Date: 2003-02-16 21:33:47
136Diffie–Hellman key exchange / Cryptography / Ciphertext indistinguishability / Advantage

Universally Composable Efficient Priced Oblivious Transfer from a Flexible Membership Encryption∗ Pratish Datta, Ratna Dutta, and Sourav Mukhopadhyay Department of Mathematics Indian Institute of Technology Kharagpur K

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-07-28 02:48:34
137Diffie–Hellman key exchange / Public-key cryptography / Internet Key Exchange / Shared secret / Public key infrastructure / Elliptic curve Diffie–Hellman / MQV / Cryptography / Cryptographic protocols / Key-agreement protocol

Deniable Authenticated Key Establishment for Internet Protocols Colin Boyd1? and Wenbo Mao2?? and Kenneth G. Paterson3? ? ? 1 Information Security Research Centre, Queensland University of Technology,

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2004-04-22 14:15:54
138Password-authenticated key agreement / Password / Diffie–Hellman key exchange / Man-in-the-middle attack / IEEE P1363 / XTR / Password Authenticated Key Exchange by Juggling / Cryptographic protocols / Cryptography / SPEKE

The SPEKE Protocol Revisited Feng Hao, Siamak F. Shahandashti Newcastle University, UK {feng.hao, siamak.shahandashti}@ncl.ac.uk Abstract. The SPEKE protocol is commonly considered one of the classic Password Authentica

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-09-25 17:34:38
139Key management / Secure communication / Public key infrastructure / Grid Security Infrastructure / Key-agreement protocol / X.509 / Transport Layer Security / Key exchange / Diffie–Hellman key exchange / Cryptography / Cryptographic protocols / Public-key cryptography

On the Application of Identity-Based Cryptography in Grid Security Hoon Wei Lim Thesis submitted to the University of London for the degree of Doctor of Philosophy

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2006-05-02 10:04:49
UPDATE