Diffie–Hellman key exchange

Results: 233



#Item
11E-th roots and static Diffie-Hellman using index calculus Antoine Joux1 Joint work with Reynald Lercier2 , David Naccache3 , Emmanuel Thome´ 4  Elliptic Curve Cryptography 2008

E-th roots and static Diffie-Hellman using index calculus Antoine Joux1 Joint work with Reynald Lercier2 , David Naccache3 , Emmanuel Thome´ 4 Elliptic Curve Cryptography 2008

Add to Reading List

Source URL: www.hyperelliptic.org

Language: English - Date: 2008-10-04 13:47:14
12Provably Authenticated Group Diffie-Hellman Key Exchange – The Dynamic Case Emmanuel Bresson1 , Olivier Chevassut2,3? , and David Pointcheval1 ´ Ecole Normale Sup´erieure, 75230 Paris Cedex 05, France

Provably Authenticated Group Diffie-Hellman Key Exchange – The Dynamic Case Emmanuel Bresson1 , Olivier Chevassut2,3? , and David Pointcheval1 ´ Ecole Normale Sup´erieure, 75230 Paris Cedex 05, France

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2006-12-12 19:25:24
    13An extended abstract of this paper was published in the proceedings of AsiacryptComputationally Secure Pattern Matching in the Presence of Malicious Adversaries Carmit Hazay∗

    An extended abstract of this paper was published in the proceedings of AsiacryptComputationally Secure Pattern Matching in the Presence of Malicious Adversaries Carmit Hazay∗

    Add to Reading List

    Source URL: www.eng.biu.ac.il

    Language: English - Date: 2013-02-05 01:02:43
    14Internet Engineering Task Force (IETF) Request for Comments: 6380 Category: Informational ISSN: K. Burgin

    Internet Engineering Task Force (IETF) Request for Comments: 6380 Category: Informational ISSN: K. Burgin

    Add to Reading List

    Source URL: www.rfc-editor.org

    Language: English - Date: 2011-10-18 14:31:43
    15One-Round Secure Computation and Secure Autonomous Mobile Agents (Extended Abstract) Christian Cachin1 , Jan Camenisch1 , Joe Kilian2 , and Joy M¨ uller1 Abstract. This paper investigates one-round secure computation be

    One-Round Secure Computation and Secure Autonomous Mobile Agents (Extended Abstract) Christian Cachin1 , Jan Camenisch1 , Joe Kilian2 , and Joy M¨ uller1 Abstract. This paper investigates one-round secure computation be

    Add to Reading List

    Source URL: www.zurich.ibm.com

    Language: English - Date: 2000-04-12 11:39:28
    16Distributed Collaborative Key Agreement Protocols for Dynamic Peer Groups Patrick P. C. Lee Department of Computer Science & Engineering The Chinese University of Hong Kong

    Distributed Collaborative Key Agreement Protocols for Dynamic Peer Groups Patrick P. C. Lee Department of Computer Science & Engineering The Chinese University of Hong Kong

    Add to Reading List

    Source URL: www.cs.cuhk.hk

    Language: English - Date: 2004-06-11 06:27:45
    17Pairing-Based Onion Routing with Improved Forward Secrecy ANIKET KATE, GREG M. ZAVERUCHA, and IAN GOLDBERG University of Waterloo  This article presents new protocols for onion routing anonymity networks. We define a pro

    Pairing-Based Onion Routing with Improved Forward Secrecy ANIKET KATE, GREG M. ZAVERUCHA, and IAN GOLDBERG University of Waterloo This article presents new protocols for onion routing anonymity networks. We define a pro

    Add to Reading List

    Source URL: www.cypherpunks.ca

    Language: English - Date: 2010-12-30 09:39:44
    18Implementation of Group Member Authentication Protocol in Mobile Ad-hoc Networks Hitoshi Asaeda∗ , Musfiq Rahman† , Mohammad Hossein Manshaei‡ , Yasuko Fukuzawa§ University, Graduate School of Media and Governance

    Implementation of Group Member Authentication Protocol in Mobile Ad-hoc Networks Hitoshi Asaeda∗ , Musfiq Rahman† , Mohammad Hossein Manshaei‡ , Yasuko Fukuzawa§ University, Graduate School of Media and Governance

    Add to Reading List

    Source URL: web.sfc.wide.ad.jp

    Language: English - Date: 2006-01-24 03:14:56
    19Minding your p’s and q’s Ross Anderson1 , Serge Vaudenay2 1 Computer Laboratory, Pembroke Street, Cambridge, CB2 3QG, England Ecole Normal Sup´erieure — DMI, 45 rue d’Ulm, 75230 Paris, France

    Minding your p’s and q’s Ross Anderson1 , Serge Vaudenay2 1 Computer Laboratory, Pembroke Street, Cambridge, CB2 3QG, England Ecole Normal Sup´erieure — DMI, 45 rue d’Ulm, 75230 Paris, France

    Add to Reading List

    Source URL: book.huihoo.com

    Language: English - Date: 2006-07-27 09:21:33
    20Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice David Adrian¶ Karthikeyan Bhargavan∗ Zakir Durumeric¶ Pierrick Gaudry† Matthew Green§ J. Alex Halderman¶ Nadia Heninger‡ Drew Springall¶ Emmanuel

    Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice David Adrian¶ Karthikeyan Bhargavan∗ Zakir Durumeric¶ Pierrick Gaudry† Matthew Green§ J. Alex Halderman¶ Nadia Heninger‡ Drew Springall¶ Emmanuel

    Add to Reading List

    Source URL: weakdh.org

    Language: English - Date: 2015-05-22 22:25:48