Diffie–Hellman key exchange

Results: 233



#Item
41Secure Sessions from Weak Secrets Michael Roe1 Bruce Christianson2 David Wheeler3 1

Secure Sessions from Weak Secrets Michael Roe1 Bruce Christianson2 David Wheeler3 1

Add to Reading List

Source URL: www.chiark.greenend.org.uk

Language: English - Date: 2010-08-20 09:24:39
42A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol ? SeongHan Shin1 , Kazukuni Kobara1 , and Hideki Imai2,1 1  Research Center for Information Security (RCIS),

A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol ? SeongHan Shin1 , Kazukuni Kobara1 , and Hideki Imai2,1 1 Research Center for Information Security (RCIS),

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-21 19:36:43
43c ACM, 2006. This is the author’s version of the work. It is posted here by permission of ACM for your personal use. 
 Not for redistribution. The definitive version was published in Proceedings of the 2006 ACM Symposi

c ACM, 2006. This is the author’s version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in Proceedings of the 2006 ACM Symposi

Add to Reading List

Source URL: www.bmoeller.de

Language: English - Date: 2006-05-22 09:04:49
44A new security proof for Damg˚ ard’s ElGamal Kristian Gjøsteen March 17, 2005  Abstract

A new security proof for Damg˚ ard’s ElGamal Kristian Gjøsteen March 17, 2005 Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-03-17 15:37:01
45On the Relations Between Non-Interactive Key Distribution, Identity-Based Encryption and Trapdoor Discrete Log Groups Kenneth G. Paterson and Sriramkrishnan Srinivasan Information Security Group, Royal Holloway, Universi

On the Relations Between Non-Interactive Key Distribution, Identity-Based Encryption and Trapdoor Discrete Log Groups Kenneth G. Paterson and Sriramkrishnan Srinivasan Information Security Group, Royal Holloway, Universi

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-10-12 12:17:42
46An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials Jan Camenisch1 , Markulf Kohlweiss2 , and Claudio Soriente3 1  2

An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials Jan Camenisch1 , Markulf Kohlweiss2 , and Claudio Soriente3 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-22 05:56:52
47A preliminary version appears in ISC 2009, Lecture Notes in Computer Science, Springer-Verlag, 2009. This version is dated December 18, 2009. Security Analysis of the PACE Key-Agreement Protocol Jens Bender1

A preliminary version appears in ISC 2009, Lecture Notes in Computer Science, Springer-Verlag, 2009. This version is dated December 18, 2009. Security Analysis of the PACE Key-Agreement Protocol Jens Bender1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-12-18 06:37:52
48Cryptanalysis of an efficient certificateless two-party authenticated key agreement protocol Qingfeng Cheng Luoyang University of Foreign Languages, Luoyang, PR China

Cryptanalysis of an efficient certificateless two-party authenticated key agreement protocol Qingfeng Cheng Luoyang University of Foreign Languages, Luoyang, PR China

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-28 03:05:00
49Improvement of Ma ni ke ta l .

Improvement of Ma ni ke ta l .

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-12-09 05:56:33
50Password-Authenticated Multi-Party Key Exchange with Different Passwords Jeong Ok Kwon† , Ik Rae Jeong§ , Kouichi Sakurai‡ , and Dong Hoon Lee† †  Center for Information Security Technologies (CIST), Korea Unive

Password-Authenticated Multi-Party Key Exchange with Different Passwords Jeong Ok Kwon† , Ik Rae Jeong§ , Kouichi Sakurai‡ , and Dong Hoon Lee† † Center for Information Security Technologies (CIST), Korea Unive

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-12-25 07:03:53