Diffie–Hellman key exchange

Results: 233



#Item
201Key-agreement protocol / MQV / Public-key cryptography / XTR / Computational Diffie–Hellman assumption / Advantage / Perfect forward secrecy / Diffie–Hellman problem / Ciphertext indistinguishability / Cryptography / Cryptographic protocols / Diffie–Hellman key exchange

Strongly-Secure Identity-based Key Agreement and Anonymous Extension Sherman S.M. Chow1 and Kim-Kwang Raymond Choo2,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-01-03 02:55:34
202Electronic commerce / Diffie–Hellman key exchange / RSA / XTR / Digital signature / Cipher / Three-pass protocol / SPEKE / Cryptography / Public-key cryptography / Cryptographic protocols

The history of Non-Secret Encryption y J H Ellis

Add to Reading List

Source URL: web.archive.org

Language: English
203Deniable authentication / Off-the-Record Messaging / Diffie–Hellman key exchange / Cryptographic hash function / Alice and Bob / Digital signature / Cryptography / Cryptographic protocols / Public-key cryptography

Multi-party Off-the-Record Messaging Ian Goldberg

Add to Reading List

Source URL: www.cs.ucdavis.edu

Language: English - Date: 2009-08-26 20:14:40
204Off-the-Record Messaging / Key-agreement protocol / Diffie–Hellman key exchange / Public-key cryptography / Secure communication / Man-in-the-middle attack / Secure Shell / MQV / Internet Key Exchange / Cryptographic protocols / Cryptography / Deniable authentication

Secure Off-the-Record Messaging Mario Di Raimondo

Add to Reading List

Source URL: www.dmi.unict.it

Language: English - Date: 2005-09-03 05:31:59
205Public-key cryptography / Diffie–Hellman key exchange / ElGamal encryption / Diffie–Hellman problem / Polynomial / RSA / Prime number / XTR / Elliptic curve Diffie–Hellman / Cryptography / Cryptographic protocols / Finite fields

In Advances in Cryptology—Asiacrypt’99, Vol[removed]of Lecture Notes in Computer Science, Springer-Verlag, 1999. pp[removed]Doing More with Fewer Bits

Add to Reading List

Source URL: www.win.tue.nl

Language: English - Date: 2000-02-21 14:17:00
206Diffie–Hellman key exchange / Public-key cryptography / Key exchange / Shared secret / Man-in-the-middle attack / Interlock protocol / Cryptography / Cryptographic protocols / Off-the-Record Messaging

Finite-State Security Analysis of OTR Version 2 Joseph Bonneau

Add to Reading List

Source URL: seclab.stanford.edu

Language: English - Date: 2006-03-21 17:10:20
207Public-key cryptography / Publicly Verifiable Secret Sharing / Finite fields / Verifiable secret sharing / Secret sharing / ElGamal encryption / Diffie–Hellman key exchange / Diffie–Hellman problem / Decisional Diffie–Hellman assumption / Cryptography / Cryptographic protocols / Computational hardness assumptions

In Advances in Cryptology—CRYPTO ’99, Vol[removed]of Lecture Notes in Computer Science, Springer-Verlag, 1999. pp[removed]A Simple Publicly Verifiable Secret Sharing

Add to Reading List

Source URL: www.win.tue.nl

Language: English - Date: 2001-04-03 10:12:09
208Diffie–Hellman problem / Group signature / Digital signature / ID-based encryption / Weil pairing / Pairing / RSA / Diffie–Hellman key exchange / Public-key cryptography / Cryptography / BLS / Pairing-based cryptography

Short Signature Scheme From Bilinear Pairings Sedat Akleylek , Barı¸s B¨ ulent Kırlar

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2009-06-09 04:23:16
209Cryptographic protocols / Diffie–Hellman key exchange / Key generation / Digital signature / RSA / Key / X.509 / Cipher / Elliptic curve Diffie–Hellman / Cryptography / Public-key cryptography / Key management

Public Key Cryptography - Applications Algorithms and Mathematical Explanations Public Key Cryptography

Add to Reading List

Source URL: www.infosecwriters.com

Language: English - Date: 2007-06-12 10:38:53
210Ciphertext indistinguishability / Semantic security / ElGamal encryption / Advantage / RSA / Cipher / Diffie–Hellman key exchange / XTR / Chosen-ciphertext attack / Cryptography / Public-key cryptography / ID-based encryption

Appears in SIAM J. of Computing, Vol. 32, No. 3, pp[removed], 2003. An extended abstract of this paper appears in the Proceedings of Crypto 2001, volume 2139 of Lecture Notes in Computer Science, pages 213–229, Springer-Verlag, 2001.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2010-06-04 16:24:14
UPDATE