Elliptic curve Diffie–Hellman

Results: 62



#Item
11Accumulator / Central processing unit / Elliptic curve cryptography / Bloom filter / Elliptic curve Diffie–Hellman / Elliptic curve / Key / Wireless sensor network / Contiki / Cryptography / Key management / Public-key cryptography

Introduction to Laboratory Research : Evaluation of a Distributed Key Certification using Accumulators in very Constrained Wireless Sensor Networks Andr´e Naz1 Supervisors: Jun-Young Bae2 , Franck Rousseau2

Add to Reading List

Source URL: ensiwiki.ensimag.fr

Language: English - Date: 2013-05-26 13:35:07
12XTR / Function / Cryptographic protocols / Mathematics / Elliptic curve Diffie–Hellman / Public-key cryptography

A quantum-safe circuit-extension handshake for Tor

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-09 11:35:22
13Computing / Telecommunications engineering / Key distribution / Key management / Wireless mesh network / Public-key cryptography / ANT / Sensor node / Elliptic curve Diffie–Hellman / Wireless sensor network / Wireless networking / Technology

Securing Network Access in Wireless Sensor Networks* Kun Sun§ § An Liu†

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:22
14Diffie–Hellman problem / Key-agreement protocol / Public-key cryptography / Key exchange / Elliptic curve cryptography / ID-based encryption / Internet Key Exchange / Boneh/Franklin scheme / Elliptic curve Diffie–Hellman / Cryptographic protocols / Cryptography / Diffie–Hellman key exchange

Weaknesses of the Boyd-Mao Deniable Authenticated key Establishment for Internet Protocols Jue-Sam Chou1 , Yalin Chen 2 , Ming-De Yang 3 1 Department of Information Management, Nanhua University Chiayi 622 Taiwan, R.O.C

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-12-09 06:49:50
15Secure communication / Internet standards / Cipher suite / Transport Layer Security / Elliptic curve cryptography / Elliptic curve Diffie–Hellman / X.509 / Public-key cryptography / Key / Cryptography / Cryptographic protocols / Internet protocols

Network Working Group Request for Comments: 4492 Category: Informational S. Blake-Wilson SafeNet

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2006-05-16 18:05:25
16Secure communication / Key management / Transport Layer Security / Public-key cryptography / Perfect forward secrecy / Cipher suite / Secure Shell / Key / Elliptic curve Diffie–Hellman / Cryptography / Cryptographic protocols / Internet protocols

PDF Document

Add to Reading List

Source URL: www.isecpartners.com

Language: English - Date: 2014-09-04 15:37:42
17Group theory / Finite fields / Computational hardness assumptions / Logarithms / Discrete logarithm / Diffie–Hellman problem / Baby-step giant-step / Elliptic curve / Diffie–Hellman key exchange / Abstract algebra / Cryptography / Mathematics

Chapter 10 Number-Theoretic Primitives Number theory is a source of several computational problems that serve as primitives in the design of cryptographic schemes. Asymmetric cryptography in particular relies on these pr

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2009-09-20 23:35:30
18Public-key cryptography / Adaptive chosen-ciphertext attack / Elliptic curve cryptography / Diffie–Hellman problem / Advantage / Chosen-ciphertext attack / Cipher / Key encapsulation / Elliptic curve Diffie–Hellman / Cryptography / Finite fields / Ciphertext indistinguishability

Appears in P. Samarati, P. Ryan, D. Gollmann, R. Molva (Eds.): Computer Security – ESORICS 2004, Springer-Verlag LNCS 3193, pp. 335–351, ISBNA Public-Key Encryption Scheme with Pseudo-Random Ciphertex

Add to Reading List

Source URL: www.bmoeller.de

Language: English - Date: 2006-01-02 00:25:23
19Computer network security / Kerberos / Diffie–Hellman key exchange / Cipher suite / Elliptic curve Diffie–Hellman / Shared secret / Whitfield Diffie / Ticket Granting Ticket / Key exchange / Cryptography / Cryptographic protocols / Key management

draft-vanrein-krb5-kdh-00 - KRB5-KDH: Cryptographically binding Kerberos5 with Diffie-Hellman

Add to Reading List

Source URL: tools.ietf.org

Language: English - Date: 2015-04-26 16:01:52
20Elliptic curve Diffie–Hellman / Public-key cryptography / Diffie–Hellman problem / Cryptography / Cryptographic protocols / Diffie–Hellman key exchange

A quantum-safe circuit-extension handshake for Tor John Schanck1,2 , William Whyte1 , and Zhenfei Zhang1 1 Security Innovation, Wilmington, MA[removed]University of Waterloo, Waterloo, Canada

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-26 06:52:05
UPDATE