Diffie–Hellman key exchange

Results: 233



#Item
61Advantage / Adversary model / Diffie–Hellman problem / Random oracle / Cryptography / Cryptographic protocols / Cryptographic hash functions

Strongly Secure Authenticated Key Exchange Protocol Based on Computational Diffie-Hellman Problem Hai Huang and Zhenfu Cao Department of Computer Science and Engineering, Shanghai Jiaotong University, 800 Dongchuan Road,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-11-27 03:18:55
62Electronic commerce / Learning with errors / Machine learning / XTR / Normal distribution / Diffie–Hellman key exchange / Diffie–Hellman problem / RSA / Cryptography / Cryptographic protocols / Finite fields

A Simple Provably Secure Key Exchange Scheme Based on the Learning with Errors Problem Jintai Ding, Xiang Xie, Xiaodong Lin University of Cincinnati Chinese Academy of Sciences Rutgers University

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-07-29 14:01:16
63Transmission Control Protocol / Public-key cryptography / Cryptography / Cryptographic protocols / Diffie–Hellman key exchange

On the security of a group key agreement protocol Qiang Tang ´ D´epartement d’Informatique, Ecole Normale Sup´erieure 45 Rue d’Ulm, 75230 Paris Cedex 05, France

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-12-12 15:34:38
64Diffie–Hellman key exchange / Learning with errors / XTR / Onion routing / Homomorphic encryption / Transport Layer Security / RSA / Cryptography / Cryptographic protocols / Electronic commerce

Post-Quantum Secure Onion Routing (Future Anonymity in Today’s Budget) Satrajit Ghosh† † Aniket Kate‡

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-09 11:34:21
65Computer network security / Kerberos / Diffie–Hellman key exchange / Cipher suite / Elliptic curve Diffie–Hellman / Shared secret / Whitfield Diffie / Ticket Granting Ticket / Key exchange / Cryptography / Cryptographic protocols / Key management

draft-vanrein-krb5-kdh-00 - KRB5-KDH: Cryptographically binding Kerberos5 with Diffie-Hellman

Add to Reading List

Source URL: tools.ietf.org

Language: English - Date: 2015-04-26 16:01:52
66Internet privacy / Cryptographic software / Off-the-Record Messaging / Diffie–Hellman key exchange / Key exchange / Man-in-the-middle attack / Deniable authentication / Digital signature / SecureIM / Cryptography / Cryptographic protocols / Public-key cryptography

Off-the-Record Communication, or, Why Not To Use PGP Nikita Borisov UC Berkeley Ian Goldberg

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2004-12-12 23:04:41
67Cryptographic protocols / Digital signature / RSA / Diffie–Hellman key exchange / Key-agreement protocol / Cypherpunk / Perfect forward secrecy / Key / Public key infrastructure / Cryptography / Key management / Public-key cryptography

Two Remarks on Public Key Cryptology Ross Anderson University of Cambridge Computer Laboratory, New Museums Site, Pembroke Street, Cambridge CB2 3QG, UK

Add to Reading List

Source URL: cypherspace.org

Language: English - Date: 2003-11-23 22:40:31
68Online chat / Electronic commerce / Diffie–Hellman key exchange / Email / Internet Relay Chat / XTR / RSA / Man-in-the-middle attack / Transmission Control Protocol / Cryptography / Cryptographic protocols / Computing

Apres - A System For Anonymous Presence Ben Laurie Step 2, 17 Perryn Road, London W3 7LR, United Kingdom Abstract. If Alice wants to know when Bob is online, and they don’t want anyone else to know th

Add to Reading List

Source URL: apache-ssl.securehost.com

Language: English - Date: 2009-01-02 13:32:36
69Deniable authentication / Off-the-Record Messaging / Diffie–Hellman key exchange / Cryptographic hash function / Alice and Bob / Digital signature / Cryptography / Cryptographic protocols / Public-key cryptography

Multi-party Off-the-Record Messaging Ian Goldberg ˘ Berkant Ustaoglu

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2009-08-01 14:09:59
70Cryptographic protocols / Diffie–Hellman key exchange / Finite fields / RSA / Euclidean algorithm / Naor-Reingold Pseudorandom Function / Cryptography / Mathematics / Public-key cryptography

CS255: Cryptography and Computer Security Winter 2002 Final Exam Instructions

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2004-01-05 17:05:04
UPDATE