Diffie–Hellman key exchange

Results: 233



#Item
141Cryptographic protocols / Computational hardness assumptions / Whitfield Diffie / Diffie–Hellman key exchange / Diffie–Hellman problem / Digital signature / Random oracle / Standard model / Hellman / Cryptography / Public-key cryptography / Key management

Non-Interactive Key Exchange and Key Assignment Schemes Eduarda Sim˜oes Veloso Freire Thesis submitted to the University of London for the degree of Doctor of Philosophy

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2014-02-04 17:42:47
142MQV / Key-agreement protocol / Diffie–Hellman key exchange / Perfect forward secrecy / Digital signature / Diffie–Hellman problem / Whitfield Diffie / Cryptography / Cryptographic protocols / Public-key cryptography

Cryptographic Schemes based on Elliptic Curve Pairings Sattam S. Al-Riyami Thesis submitted to the University of London for the degree of Doctor of Philosophy

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2004-06-16 10:55:54
143Decisional Diffie–Hellman assumption / Mathematics / Diffie–Hellman problem / XTR / Diffie–Hellman key exchange / Computational Diffie–Hellman assumption / Computational hardness assumptions / Finite fields / Cryptographic protocols

Advances in Cryptology – Proceedings of Crypto ’07 (August 19–[removed], Santa Barbara, CA) A. Menezes Ed. Springer-Verlag, LNCS 4622, pages 482–499. A generalization of DDH with applications to protocol analysis a

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2012-11-06 05:29:19
144Computer network security / MQV / Diffie–Hellman key exchange / Authentication / AKA / Cryptography / Cryptographic protocols / Public-key cryptography

An extended abstract of this work appears in Proceedings of the 5th International Conference (SCN ’06) (6 – 8 september 2006, Maiori, Italy) M. Yung Ed., Springer-Verlag, LNCS 4116, Pages 186–200. A New Key Exchang

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2012-11-06 05:29:21
145Finite fields / Logarithms / Computational hardness assumptions / Group theory / Diffie–Hellman problem / Index calculus algorithm / Discrete logarithm / XTR / Elliptic curve cryptography / Abstract algebra / Cryptography / Mathematics

The Past, evolving Present and Future of Discrete Logarithm Antoine Joux, Andrew Odlyzko and Cécile Pierrot Abstract The first practical public key cryptosystem ever published, the Diffie-Hellman key exchange algorithm,

Add to Reading List

Source URL: www.dtc.umn.edu

Language: English - Date: 2014-06-04 21:00:21
146Diffie–Hellman key exchange / Station-to-Station protocol / Diffie–Hellman problem / Key-agreement protocol / XTR / Advantage / Random self-reducibility / Public-key cryptography / Oracle machine / Cryptography / Cryptographic protocols / MQV

An extended abstract of this work appears in Proceedings of the 5th International Conference (SCN ’06) (6 – 8 september 2006, Maiori, Italy) M. Yung Ed., Springer-Verlag, LNCS 4116, Pages 156–172. About the Securit

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2012-11-06 05:29:21
147Public-key cryptography / Diffie–Hellman key exchange / Communications protocol / Key-agreement protocol / Oracle machine / Random oracle / Cryptography / Cryptographic protocols / Advantage

An extended abstract of this work appeared in: The 4th International Conference on Autonomic and Trusted Computing (ATC ’07) (July 11–[removed], Hong-Kong, China) B. Xiao, L. T. Yang, J. Ma, C. Muller-Schloer and Y. Hu

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2012-11-06 05:29:19
148Random oracle / Universal composability / Public-key cryptography / Oracle Corporation / Diffie–Hellman key exchange / Oracle Database / IP / Security parameter / Cryptography / Cryptographic protocols / Advantage

Annual Symposium on InformAtion, Computer and Communications Security – Proceedings of ACM ASIA CCS ’08 (March 18–20, 2008, Tokyo, JP) V. Gligor and M. Abe, Eds., ACM Press, pages ????–???? Securing Group Key Exc

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2012-11-06 05:29:19
149Diffie–Hellman key exchange / Parramatta Eels season / Augmentative and alternative communication

MCLL PROGRAM ASSESSMENT PLAN, [removed]SPANISH Course SLO Time Period Direct Measures Target Status

Add to Reading List

Source URL: www.csun.edu

Language: English - Date: 2014-07-10 14:03:49
150Notary / Blind signature / Electronic voting / Digital signature / Trusted third party / RSA / Diffie–Hellman key exchange / Non-repudiation / Alice and Bob / Cryptography / Public-key cryptography / Cryptographic protocols

An Abuse-Free Fair Contract Signing Protocol Based on the RSA Signature Guilin Wang Infocomm Security Department Institute for Infocomm Research (I2 R) 21 Heng Mui Keng Terrace, Singapore[removed]

Add to Reading List

Source URL: www2005.org

Language: English - Date: 2005-03-31 05:24:15
UPDATE