Elliptic curve Diffie–Hellman

Results: 62



#Item
11Introduction to Laboratory Research : Evaluation of a Distributed Key Certification using Accumulators in very Constrained Wireless Sensor Networks Andr´e Naz1 Supervisors: Jun-Young Bae2 , Franck Rousseau2

Introduction to Laboratory Research : Evaluation of a Distributed Key Certification using Accumulators in very Constrained Wireless Sensor Networks Andr´e Naz1 Supervisors: Jun-Young Bae2 , Franck Rousseau2

Add to Reading List

Source URL: ensiwiki.ensimag.fr

Language: English - Date: 2013-05-26 13:35:07
12A quantum-safe circuit-extension handshake for Tor

A quantum-safe circuit-extension handshake for Tor

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-09 11:35:22
13Securing Network Access in Wireless Sensor Networks* Kun Sun§ § An Liu†

Securing Network Access in Wireless Sensor Networks* Kun Sun§ § An Liu†

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:22
14Weaknesses of the Boyd-Mao Deniable Authenticated key Establishment for Internet Protocols Jue-Sam Chou1 , Yalin Chen 2 , Ming-De Yang 3 1  Department of Information Management, Nanhua University Chiayi 622 Taiwan, R.O.C

Weaknesses of the Boyd-Mao Deniable Authenticated key Establishment for Internet Protocols Jue-Sam Chou1 , Yalin Chen 2 , Ming-De Yang 3 1 Department of Information Management, Nanhua University Chiayi 622 Taiwan, R.O.C

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-12-09 06:49:50
15Network Working Group Request for Comments: 4492 Category: Informational S. Blake-Wilson SafeNet

Network Working Group Request for Comments: 4492 Category: Informational S. Blake-Wilson SafeNet

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2006-05-16 18:05:25
16

PDF Document

Add to Reading List

Source URL: www.isecpartners.com

Language: English - Date: 2014-09-04 15:37:42
17Chapter 10 Number-Theoretic Primitives Number theory is a source of several computational problems that serve as primitives in the design of cryptographic schemes. Asymmetric cryptography in particular relies on these pr

Chapter 10 Number-Theoretic Primitives Number theory is a source of several computational problems that serve as primitives in the design of cryptographic schemes. Asymmetric cryptography in particular relies on these pr

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2009-09-20 23:35:30
18Appears in P. Samarati, P. Ryan, D. Gollmann, R. Molva (Eds.): Computer Security – ESORICS 2004, Springer-Verlag LNCS 3193, pp. 335–351, ISBNA Public-Key Encryption Scheme with Pseudo-Random Ciphertex

Appears in P. Samarati, P. Ryan, D. Gollmann, R. Molva (Eds.): Computer Security – ESORICS 2004, Springer-Verlag LNCS 3193, pp. 335–351, ISBNA Public-Key Encryption Scheme with Pseudo-Random Ciphertex

Add to Reading List

Source URL: www.bmoeller.de

Language: English - Date: 2006-01-02 00:25:23
19draft-vanrein-krb5-kdh-00 - KRB5-KDH: Cryptographically binding Kerberos5 with Diffie-Hellman

draft-vanrein-krb5-kdh-00 - KRB5-KDH: Cryptographically binding Kerberos5 with Diffie-Hellman

Add to Reading List

Source URL: tools.ietf.org

Language: English - Date: 2015-04-26 16:01:52
20A quantum-safe circuit-extension handshake for Tor John Schanck1,2 , William Whyte1 , and Zhenfei Zhang1 1 Security Innovation, Wilmington, MA[removed]University of Waterloo, Waterloo, Canada

A quantum-safe circuit-extension handshake for Tor John Schanck1,2 , William Whyte1 , and Zhenfei Zhang1 1 Security Innovation, Wilmington, MA[removed]University of Waterloo, Waterloo, Canada

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-26 06:52:05