Diffie–Hellman key exchange

Results: 233



#Item
151Cryptographic protocols / MQV / Elliptic curve cryptography / Diffie–Hellman key exchange / Static key / Ephemeral key / Key-agreement protocol / Cryptography / Public-key cryptography / Key management

Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography

Add to Reading List

Source URL: nvlpubs.nist.gov

Language: English - Date: 2014-05-20 16:37:31
152Cryptographic protocols / ElGamal encryption / Cipher / Key / Man-in-the-middle attack / RSA / Diffie–Hellman key exchange / ID-based encryption / Threshold cryptosystem / Cryptography / Public-key cryptography / Key management

Time-Lapse Cryptography Technical Report TR[removed]Michael O. Rabin∗ Christopher Thorpe

Add to Reading List

Source URL: www.eecs.harvard.edu

Language: English - Date: 2006-12-20 15:07:12
153Data / Diffie–Hellman key exchange / X Window System / Transmission Control Protocol / Cryptographic protocols / Software / Computing

Ace: An Efficient Key-Exchange Protocol for Onion Routing Michael Backes Aniket Kate

Add to Reading List

Source URL: www.infsec.cs.uni-saarland.de

Language: English - Date: 2014-07-15 05:27:21
154Online chat / Electronic commerce / Diffie–Hellman key exchange / Email / Internet Relay Chat / XTR / RSA / Man-in-the-middle attack / Transmission Control Protocol / Cryptography / Cryptographic protocols / Computing

Apres - A System For Anonymous Presence Ben Laurie Step 2, 17 Perryn Road, London W3 7LR, United Kingdom [removed] Abstract. If Alice wants to know when Bob is online, and they don’t want anyone else to know th

Add to Reading List

Source URL: www.apache-ssl.org

Language: English - Date: 2009-01-02 13:32:36
155FIPS 140-2 / FIPS 140 / Key-agreement protocol / Password / Critical Security Parameter / Key management / Authentication / Diffie–Hellman key exchange / Whitfield Diffie / Cryptography / Cryptographic protocols / Cryptography standards

SNAPfone Security Policy Document Version 1.8 Snapshield, Ltd.

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
156Secure communication / Key management / Whitfield Diffie / Diffie–Hellman key exchange / Key exchange / RSA / Personal identification number / Index of cryptography articles / Secure Communications Interoperability Protocol / Cryptography / Cryptographic protocols / Public-key cryptography

L-3 Communications Privatel™ Model 960v Software Version 6.01, Part Number: K10047665-501 &

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
157Finite fields / Cryptographic protocols / Diffie–Hellman problem / Hellman / XTR / CDH / Diffie–Hellman key exchange / Whitfield Diffie / Discrete logarithm / Cryptography / Abstract algebra / Computational hardness assumptions

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2010-05-04 11:48:24
158Finite fields / Cryptographic protocols / Diffie–Hellman problem / Trapdoor function / Hellman / XTR / CDH / Diffie–Hellman key exchange / Discrete logarithm / Cryptography / Abstract algebra / Computational hardness assumptions

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2013-03-26 12:35:28
159Electoral systems / Social choice theory / Elections / Voting system / Diffie–Hellman key exchange / Electronic voting / Voting / XTR / Sociology / Cryptographic protocols / Politics / Psephology

A Fair and Robust Voting System by Broadcast No Author Given No Institute Given Abstract. In 2010, Hao, Ryan & Zieli´ nski proposed a two-round decentralized voting protocol that is efficient in terms of rounds, computa

Add to Reading List

Source URL: homepages.cs.ncl.ac.uk

Language: English - Date: 2011-06-15 11:47:16
160Password-authenticated key agreement / SPEKE / Password / Key-agreement protocol / Diffie–Hellman key exchange / Encrypted key exchange / Man-in-the-middle attack / Public-key cryptography / Salt / Cryptographic protocols / Cryptography / Password Authenticated Key Exchange by Juggling

J-PAKE: Authenticated Key Exchange without PKI Feng Hao1 and Peter Ryan2 1 2

Add to Reading List

Source URL: homepages.cs.ncl.ac.uk

Language: English - Date: 2010-12-17 06:46:52
UPDATE