Diffie–Hellman key exchange

Results: 233



#Item
191Diffie–Hellman key exchange / Public-key cryptography / Key exchange / Shared secret / Man-in-the-middle attack / Interlock protocol / Cryptography / Cryptographic protocols / Off-the-Record Messaging

Finite-State Security Analysis of OTR Version 2 Joseph Bonneau

Add to Reading List

Source URL: www.jbonneau.com

Language: English - Date: 2014-05-03 16:10:02
192Finite fields / BLS / Computational hardness assumptions / Digital signature / Full Domain Hash / Rabin signature algorithm / Diffie–Hellman key exchange / Diffie–Hellman problem / Elliptic Curve DSA / Cryptography / Public-key cryptography / Cryptographic protocols

Short Signatures from the Weil Pairing∗ Dan Boneh† [removed]

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2007-09-08 17:10:53
193Information / Password Authenticated Key Exchange by Juggling / Password-authenticated key agreement / SPEKE / Password / Encrypted key exchange / Key-agreement protocol / Diffie–Hellman key exchange / Salt / Cryptographic protocols / Cryptography / Data

J-PAKE: Authenticated Key Exchange Without PKI Feng Hao1 and Peter Ryan2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-10-25 17:14:17
194Block cipher / Cryptanalysis / Hellman / Differential cryptanalysis / Tiger / Diffie–Hellman key exchange / Index of cryptography articles / Outline of cryptography / Cryptography / Cryptographic hash functions / Cryptographic protocols

Microsoft PowerPoint - Rechberger_IDEA_v2

Add to Reading List

Source URL: www.cs.bris.ac.uk

Language: English - Date: 2012-04-20 07:04:20
195Verifiable secret sharing / Commitment scheme / Zero-knowledge proof / Secret sharing / Diffie–Hellman key exchange / Proof of knowledge / Non-interactive zero-knowledge proof / NP / ElGamal encryption / Cryptography / Cryptographic protocols / Publicly Verifiable Secret Sharing

Non-Interactive and Information-Theoretic Secure Publicly Verifiable Secret Sharing Chunming Tang1,2,∗ Dingyi Pei1,3

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-08-16 21:12:51
196Key-agreement protocol / Diffie–Hellman key exchange / Public-key cryptography / Key management / Perfect forward secrecy / Password authentication protocol / Man-in-the-middle attack / YAK / SILC / Cryptography / Cryptographic protocols / MQV

Overview of Key Agreement Protocols Ratna Dutta and Rana Barua Stat-Math Unit

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-10-04 07:51:24
197Eli Biham / Key exchange / Diffie–Hellman key exchange / Advanced Encryption Standard / Index of cryptography articles / Cryptography / Cryptographic protocols / Data Encryption Standard

Introduction to Cryptography[removed]4444) Dr. Orr Dunkelman

Add to Reading List

Source URL: www.cs.haifa.ac.il

Language: English - Date: 2012-10-25 14:22:57
198Off-the-Record Messaging / Man-in-the-middle attack / Diffie–Hellman key exchange / Public-key cryptography / Public key fingerprint / Alice and Bob / Blinding / RSA / Extensible Messaging and Presence Protocol / Cryptography / Cryptographic protocols / Socialist millionaire

Improved User Authentication in Off-The-Record Messaging Chris Alexander

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2007-08-16 13:09:03
199Diffie–Hellman key exchange / Public-key cryptography / Key exchange / Shared secret / Man-in-the-middle attack / Interlock protocol / Cryptography / Cryptographic protocols / Off-the-Record Messaging

Finite-State Security Analysis of OTR Version 2 Joseph Bonneau

Add to Reading List

Source URL: www.stanford.edu

Language: English - Date: 2006-03-21 17:10:20
200Finite fields / Cryptographic protocols / Group signature / Diffie–Hellman key exchange / Digital signature / Computational Diffie–Hellman assumption / ElGamal encryption / Diffie–Hellman problem / Schnorr signature / Cryptography / Computational hardness assumptions / Public-key cryptography

A Practical and Provably Secure Coalition-Resistant Group Signature Scheme Giuseppe Ateniese1 , Jan Camenisch2 , Marc Joye3 , and Gene Tsudik4

Add to Reading List

Source URL: www.zurich.ibm.com

Language: English - Date: 2000-10-24 11:52:18
UPDATE