Encrypted key exchange

Results: 12



#Item
1Cryptography / Computer access control / Cryptographic protocols / Password-authenticated key agreement / Password / Passwd / Encrypted key exchange / Crypt / Password Authenticated Key Exchange by Juggling

Oblivious PAKE: Efficient Handling of Password Trials F. Kiefer, M. Manulis

Add to Reading List

Source URL: isc2015.item.ntnu.no

Language: English - Date: 2015-09-19 12:50:59
2IEEE P1363 / SPEKE / Secure Remote Password protocol / Encrypted key exchange / Password / PKCS / Key-agreement protocol / Key exchange / Elliptic curve cryptography / Cryptography / Cryptographic protocols / Password-authenticated key agreement

PDF Document

Add to Reading List

Source URL: grouper.ieee.org

Language: English - Date: 2008-04-27 09:53:57
3Information / Password-authenticated key agreement / Cipher suite / Transport Layer Security / Password / Diffie–Hellman problem / Diffie–Hellman key exchange / Public-key cryptography / Encrypted key exchange / Cryptographic protocols / Cryptography / Data

c ACM, 2006. This is the author’s version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in Proceedings of the 2006 ACM Symposi

Add to Reading List

Source URL: www.bmoeller.de

Language: English - Date: 2006-05-22 09:04:49
4Public-key cryptography / Password authentication protocol / Key-agreement protocol / Password / Secure Remote Password protocol / Cryptographic protocols / Cryptography / Encrypted key exchange

A weakness in Sun-Chen-Hwang’s three-party key agreement protocols using passwords ? Junghyun Nam, Seungjoo Kim, Dongho Won, School of Information and Communication Engineering, Sungkyunkwan University, 300 Cheoncheon-

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-12-13 20:50:57
5Diffie–Hellman key exchange / Secure Remote Password protocol / Encrypted key exchange / Public-key cryptography / Internet Key Exchange / Salt / SPEKE / Password-authenticated key agreement / Cryptographic protocols / Cryptography / Password

The Second International Conference on Sensor Technologies and Applications Simultaneous Authentication of Equals: A Secure, Password-Based Key Exchange for Mesh Networks Dan Harkins Aruba Networks

Add to Reading List

Source URL: www.q.hscott.net

Language: English - Date: 2014-01-21 12:51:19
6Cyberwarfare / Key management / Public-key cryptography / Identity management / Security / Public key infrastructure / Security token / Computer network security / Kerberos / Computer security

Using PDFs to Exchange Signed, Encrypted Data Ron DiNapoli Cornell University, CIT/ATA 5th Annual PKI R&D Workshop

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2006-04-05 03:09:24
7Password-authenticated key agreement / SPEKE / Password / Key-agreement protocol / Diffie–Hellman key exchange / Encrypted key exchange / Man-in-the-middle attack / Public-key cryptography / Salt / Cryptographic protocols / Cryptography / Password Authenticated Key Exchange by Juggling

J-PAKE: Authenticated Key Exchange without PKI Feng Hao1 and Peter Ryan2 1 2

Add to Reading List

Source URL: homepages.cs.ncl.ac.uk

Language: English - Date: 2010-12-17 06:46:52
8SPEKE / Password Authenticated Key Exchange by Juggling / Encrypted key exchange / Diffie–Hellman key exchange / Password / Public-key cryptography / IEEE P1363 / Key exchange / Authentication / Cryptographic protocols / Cryptography / Password-authenticated key agreement

Password Authenticated Key Exchange by Juggling - A key exchange protocol without PKI

Add to Reading List

Source URL: homepages.cs.ncl.ac.uk

Language: English - Date: 2008-04-16 17:16:56
9Password-authenticated key agreement / SPEKE / Diffie–Hellman key exchange / Key-agreement protocol / Password / Encrypted key exchange / Public-key cryptography / Man-in-the-middle attack / GEC / Cryptographic protocols / Cryptography / Password Authenticated Key Exchange by Juggling

Password Authenticated Key Exchange by Juggling Feng Hao⋆1 and Peter Ryan2 1 2

Add to Reading List

Source URL: homepages.cs.ncl.ac.uk

Language: English - Date: 2008-04-30 07:42:46
10Password-authenticated key agreement / SPEKE / Password / Diffie–Hellman key exchange / Small subgroup confinement attack / Key-agreement protocol / XTR / Encrypted key exchange / Subgroup / Cryptographic protocols / Cryptography / Secure Remote Password protocol

On Small Subgroup Non-confinement Attack Feng Hao Thales E-Security, Cambridge, UK [removed] Abstract—The small subgroup confinement attack works by

Add to Reading List

Source URL: homepages.cs.ncl.ac.uk

Language: English - Date: 2010-04-26 16:33:56
UPDATE