Diffie–Hellman key exchange

Results: 233



#Item
81RSA / ElGamal encryption / Diffie–Hellman key exchange / Blum–Goldwasser cryptosystem / Cryptography / Public-key cryptography / Electronic commerce

CS255: Cryptography and Computer Security Assignment #2 Winter 2000

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2000-01-31 14:21:01
82Secure Shell / Man-in-the-middle attack / HTTP Secure / Diffie–Hellman key exchange / IPsec / Public-key cryptography / Password / Cryptographic protocols / Cryptography / Data

Alberto Ornaghi <> Marco Valleri <> Man in the middle attacks Demos

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:34
83Cryptographic protocols / Diffie–Hellman key exchange / Finite fields / RSA / Euclidean algorithm / Naor-Reingold Pseudorandom Function / Cryptography / Mathematics / Public-key cryptography

CS255: Cryptography and Computer Security Winter 2002 Final Exam Instructions

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2002-03-21 01:47:16
84Elliptic curve Diffie–Hellman / Public-key cryptography / Diffie–Hellman problem / Cryptography / Cryptographic protocols / Diffie–Hellman key exchange

A quantum-safe circuit-extension handshake for Tor John Schanck1,2 , William Whyte1 , and Zhenfei Zhang1 1 Security Innovation, Wilmington, MA[removed]University of Waterloo, Waterloo, Canada

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-26 06:52:05
85Key management / RSA / Diffie–Hellman key exchange / Modular arithmetic / Key generation / Cryptography / Public-key cryptography / Electronic commerce

Accelerating Cryptography in Hardware • Public Key • Random Number Generation • Symmetric Key Mark Birman

Add to Reading List

Source URL: www.hotchips.org

Language: English - Date: 2013-07-27 22:48:36
86Data / Public-key cryptography / Diffie–Hellman key exchange / X Window System / Transmission Control Protocol / RADIUS / Cryptography / Cryptographic protocols / Computing

Location Privacy via Private Proximity Testing Arvind Narayanan Narendran Thiagarajan Michael Hamburg

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2010-12-07 13:19:37
87Public-key cryptography / Elliptic curve Diffie–Hellman / Diffie–Hellman key exchange / YAK / Electronic money / Digital signature / Elliptic Curve DSA / MQV / Shared secret / Cryptography / Cryptographic protocols / Bitcoin

Authenticated Key Exchange over Bitcoin Patrick McCorry, Siamak F. Shahandashti, Dylan Clarke, Feng Hao Newcastle University, UK {patrick.mccorry,siamak.shahandashti,dylan.clarke,feng.hao}@ncl.ac.uk Abstract. Bitcoin is

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-03 08:37:15
88Digital signature / Rabin signature algorithm / RSA / Diffie–Hellman key exchange / ElGamal encryption / Schnorr signature / Euclidean algorithm / Naccache–Stern cryptosystem / ElGamal signature scheme / Cryptography / Public-key cryptography / XTR

Verifiable Encryption of Digital Signatures and Applications GIUSEPPE ATENIESE The Johns Hopkins University This paper presents a new simple schemes for verifiable encryption of digital signatures. We make

Add to Reading List

Source URL: www.cs.jhu.edu

Language: English - Date: 2004-05-21 14:56:23
89Diffie–Hellman key exchange / Secure Remote Password protocol / Encrypted key exchange / Public-key cryptography / Internet Key Exchange / Salt / SPEKE / Password-authenticated key agreement / Cryptographic protocols / Cryptography / Password

The Second International Conference on Sensor Technologies and Applications Simultaneous Authentication of Equals: A Secure, Password-Based Key Exchange for Mesh Networks Dan Harkins Aruba Networks

Add to Reading List

Source URL: www.q.hscott.net

Language: English - Date: 2014-01-21 12:51:19
90Communications protocol / XTR / Transmission Control Protocol / Diffie–Hellman key exchange / Digital signature / Random oracle / Oracle machine / IP / E0 / Cryptography / Cryptographic protocols / Oblivious transfer

The Simplest Protocol for Oblivious Transfer Tung Chou1 and Claudio Orlandi2 1 Technische Universieit Eindhoven 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-16 06:07:01
UPDATE