Diffie–Hellman key exchange

Results: 233



#Item
51Chapter 10 Number-Theoretic Primitives Number theory is a source of several computational problems that serve as primitives in the design of cryptographic schemes. Asymmetric cryptography in particular relies on these pr

Chapter 10 Number-Theoretic Primitives Number theory is a source of several computational problems that serve as primitives in the design of cryptographic schemes. Asymmetric cryptography in particular relies on these pr

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2009-09-20 23:35:30
521  Robustly Secure Two-Party Authenticated Key Exchange from Ring-LWE Xiaopeng Yang, Wenping Ma, and Chengli Zhang

1 Robustly Secure Two-Party Authenticated Key Exchange from Ring-LWE Xiaopeng Yang, Wenping Ma, and Chengli Zhang

Add to Reading List

Source URL: eprint.iacr.org

Language: English
53COMPUTATIONAL NUMBER THEORY and ASYMMETRIC CRYPTOGRAPHY Mihir Bellare

COMPUTATIONAL NUMBER THEORY and ASYMMETRIC CRYPTOGRAPHY Mihir Bellare

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2015-05-03 20:58:58
54One-Pass HMQV and Asymmetric Key-Wrapping Shai Halevi Hugo Krawczyk IBM Research December 22, 2010

One-Pass HMQV and Asymmetric Key-Wrapping Shai Halevi Hugo Krawczyk IBM Research December 22, 2010

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-22 12:08:05
55Microsoft Word - Weakness of shim’s New ID-based tripartite multiple-key agreement protocol最終版.doc

Microsoft Word - Weakness of shim’s New ID-based tripartite multiple-key agreement protocol最終版.doc

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-12-13 03:19:10
56Democratic Group Signatures on Example of Joint Ventures This is a full version of the fast abstract which appears at ASIACCS’2006. Mark Manulis Horst-G¨ortz Institute Ruhr-University of Bochum D-44801, Germany

Democratic Group Signatures on Example of Joint Ventures This is a full version of the fast abstract which appears at ASIACCS’2006. Mark Manulis Horst-G¨ortz Institute Ruhr-University of Bochum D-44801, Germany

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-12-20 03:49:54
57XDH assumption / Decisional Diffie–Hellman assumption / Electronic money / Public-key cryptography / Proof of knowledge / XTR / Cryptography / Cryptographic protocols / Diffie–Hellman key exchange

Practical Anonymous Divisible E-Cash From Bounded Accumulators? Man Ho Au, Willy Susilo, and Yi Mu Centre for Computer and Information Security Research School of Computer Science and Software Engineering University of W

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-12-09 02:25:32
58Microsoft Word - Design of hybrid protocol-in password-based three-party key exchange settting.doc

Microsoft Word - Design of hybrid protocol-in password-based three-party key exchange settting.doc

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-11-29 06:14:31
59On the Security of a Certificateless Public-Key Encryption Zhenfeng Zhang, Dengguo Feng State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing, P.R.China zfzhang@

On the Security of a Certificateless Public-Key Encryption Zhenfeng Zhang, Dengguo Feng State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing, P.R.China zfzhang@

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-11-23 04:27:14
60Two novel applications of bilinear groups to ABE encryption Riccardo Longo  Department of Mathematics, University of Trento, Italy Chiara Marcolla  Department of Mathema

Two novel applications of bilinear groups to ABE encryption Riccardo Longo Department of Mathematics, University of Trento, Italy Chiara Marcolla Department of Mathema

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-12 11:38:03