Diffie–Hellman key exchange

Results: 233



#Item
161SPEKE / Password Authenticated Key Exchange by Juggling / Encrypted key exchange / Diffie–Hellman key exchange / Password / Public-key cryptography / IEEE P1363 / Key exchange / Authentication / Cryptographic protocols / Cryptography / Password-authenticated key agreement

Password Authenticated Key Exchange by Juggling - A key exchange protocol without PKI

Add to Reading List

Source URL: homepages.cs.ncl.ac.uk

Language: English - Date: 2008-04-16 17:16:56
162MQV / Key-agreement protocol / Public-key cryptography / Password-authenticated key agreement / Alice and Bob / XTR / Key authentication / Station-to-Station protocol / Diffie–Hellman key exchange / Cryptography / Cryptographic protocols / YAK

On Robust Key Agreement Based on Public Key Authentication (Short Paper) Feng Hao Thales E-Security, Cambridge, UK [removed]

Add to Reading List

Source URL: homepages.cs.ncl.ac.uk

Language: English - Date: 2011-12-25 18:38:22
163System software / Software / Password Authenticated Key Exchange by Juggling / Password-authenticated key agreement / Secure Shell / Diffie–Hellman key exchange / OpenSSH / OpenSSL / Password / Cryptographic protocols / Cryptography / Cryptographic software

Session Key Retrieval in J-PAKE Implementations of OpenSSL and OpenSSH S´ebastien Martini – [removed] September 12, 2010 1

Add to Reading List

Source URL: seb.dbzteam.org

Language: English - Date: 2013-11-22 07:48:53
164Password Authenticated Key Exchange by Juggling / Password-authenticated key agreement / Password / Man-in-the-middle attack / XTR / IEEE P1363 / Public-key cryptography / Interlock protocol / Diffie–Hellman key exchange / Cryptography / Cryptographic protocols / SPEKE

Cryptanalysis of the Dragony Key Exchange Protocol Dylan Clarke, Feng Hao ∗

Add to Reading List

Source URL: homepages.cs.ncl.ac.uk

Language: English - Date: 2013-06-26 17:27:57
165Password-authenticated key agreement / SPEKE / Diffie–Hellman key exchange / Key-agreement protocol / Password / Encrypted key exchange / Public-key cryptography / Man-in-the-middle attack / GEC / Cryptographic protocols / Cryptography / Password Authenticated Key Exchange by Juggling

Password Authenticated Key Exchange by Juggling Feng Hao⋆1 and Peter Ryan2 1 2

Add to Reading List

Source URL: homepages.cs.ncl.ac.uk

Language: English - Date: 2008-04-30 07:42:46
166Password-authenticated key agreement / SPEKE / Password / Diffie–Hellman key exchange / Small subgroup confinement attack / Key-agreement protocol / XTR / Encrypted key exchange / Subgroup / Cryptographic protocols / Cryptography / Secure Remote Password protocol

On Small Subgroup Non-confinement Attack Feng Hao Thales E-Security, Cambridge, UK [removed] Abstract—The small subgroup confinement attack works by

Add to Reading List

Source URL: homepages.cs.ncl.ac.uk

Language: English - Date: 2010-04-26 16:33:56
167Internet privacy / Cryptographic software / Off-the-Record Messaging / Diffie–Hellman key exchange / Key exchange / Man-in-the-middle attack / Deniable authentication / Digital signature / SecureIM / Cryptography / Cryptographic protocols / Public-key cryptography

Off-the-Record Communication, or, Why Not To Use PGP Nikita Borisov UC Berkeley Ian Goldberg

Add to Reading List

Source URL: otr.cypherpunks.ca

Language: English - Date: 2013-09-28 15:30:06
168Cryptographic software / PGP / RSA / Diffie–Hellman key exchange / Pretty Good Privacy / Digital signature / Cipher / GNU Privacy Guard / Key / Cryptography / Public-key cryptography / Key management

Attack on Private Signature Keys of the OpenPGP format, PGPTM programs and other applications compatible with OpenPGP Vlastimil Klíma 1 and Tomáš Rosa 2 1

Add to Reading List

Source URL: www.bardolatzi.com

Language: English - Date: 2007-03-24 00:02:42
169RSA / Cipher / Diffie–Hellman key exchange / ElGamal encryption / Index of cryptography articles / Affine cipher / Cryptography / Public-key cryptography / Electronic commerce

Public-Key Crypto Basics Paul Garrett [removed]

Add to Reading List

Source URL: www.math.umn.edu

Language: English - Date: 2009-12-02 13:40:47
170Cryptographic protocols / RSA / Diffie–Hellman key exchange / ElGamal encryption / Cipher / NTRUEncrypt / XTR / Cryptography / Public-key cryptography / Electronic commerce

Intro to public-key ciphers A symmetric or private-key cipher is one in which knowledge of the encryption key is explicitly or implicitly equivalent to knowing the decryption key. A asymmetric or public-key cipher is one

Add to Reading List

Source URL: www.math.umn.edu

Language: English - Date: 2009-12-02 14:27:26
UPDATE