Forward secrecy

Results: 40



#Item
11Transport Layer Security / Secure communication / Finite fields / Cryptographic protocols / Public-key cryptography / Logjam / DiffieHellman key exchange / Index calculus algorithm / XTR / Elliptic curve DiffieHellman / Key size / Safe prime

Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice

Add to Reading List

Source URL: weakdh.org

Language: English - Date: 2015-10-15 14:53:20
12

An Experimental Study of TLS Forward Secrecy Deployments Lin-Shung Huang∗ , Shrikant Adhikarla† , Dan Boneh‡ , Collin Jackson∗ Mellon University, {linshung.huang, collin.jackson}@sv.cmu.edu † Microsoft, shrikan

Add to Reading List

Source URL: www.w2spconf.com

Language: English - Date: 2014-05-19 03:40:02
    13

    Security Now! #LOGJAM: Imperfect Forward Secrecy  This week on Security Now! ● ●

    Add to Reading List

    Source URL: www.grc.com

    Language: English - Date: 2015-05-26 16:05:22
      14Cryptographic software / Boneh/Franklin scheme / Finite fields / Tor / Onion routing / XTR / Diffie–Hellman key exchange / Public-key cryptography / Pairing / Cryptography / Internet privacy / Cryptographic protocols

      Pairing-Based Onion Routing with Improved Forward Secrecy ANIKET KATE, GREG M. ZAVERUCHA, and IAN GOLDBERG University of Waterloo This article presents new protocols for onion routing anonymity networks. We define a pro

      Add to Reading List

      Source URL: www.cypherpunks.ca

      Language: English - Date: 2010-12-30 09:39:44
      15Security / Password-authenticated key agreement / Key-agreement protocol / Public-key cryptography / Transport Layer Security / Perfect forward secrecy / Authentication protocol / Authentication / Kerberos / Cryptographic protocols / Cryptography / Data

      Designs, Codes and Cryptography manuscript No. (will be inserted by the editor) Anonymity and one-way authentication in key exchange protocols Ian Goldberg · Douglas Stebila ·

      Add to Reading List

      Source URL: www.cypherpunks.ca

      Language: English - Date: 2012-01-13 10:28:23
      16Data / Password-authenticated key agreement / Key-agreement protocol / Public-key cryptography / Transport Layer Security / Authentication / Perfect forward secrecy / HTTP Secure / Kerberos / Cryptographic protocols / Cryptography / Security

      Anonymity and one-way authentication in key exchange protocols Ian Goldberg1 , Douglas Stebila2 , and Berkant Ustaoglu3 1: Cheriton School of Computer Science, University of Waterloo, Waterloo, Ontario, Canada 2: Informa

      Add to Reading List

      Source URL: cacr.uwaterloo.ca

      Language: English - Date: 2012-01-15 19:52:05
      17Finite fields / Computational hardness assumptions / Group theory / Diffie–Hellman key exchange / XTR / Secure Shell / Cipher suite / Index calculus algorithm / Elliptic curve Diffie–Hellman / Cryptography / Abstract algebra / Cryptographic protocols

      Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice David Adrian¶ Karthikeyan Bhargavan∗ Zakir Durumeric¶ Pierrick Gaudry† Matthew Green§ J. Alex Halderman¶ Nadia Heninger‡ Drew Springall¶ Emmanuel

      Add to Reading List

      Source URL: weakdh.org

      Language: English - Date: 2015-05-22 22:25:48
      18Machine learning / AKA / Secure Shell / Perfect forward secrecy / Data / Information / Computing / Cryptography / Cryptographic protocols / Learning with errors

      Post-quantum Authenticated Key Exchange from Ideal Lattices ¨ u¨ r Dagdelen3 Jiang Zhang1 , Zhenfeng Zhang1,∗ , Jintai Ding2,∗ , Michael Snook2 , and Ozg 1 Institute of Software, Chinese Academy of Sciences, China

      Add to Reading List

      Source URL: csrc.nist.gov

      Language: English - Date: 2015-04-09 11:41:32
      19Identity management / Identity management systems / Spamming / Federated identity / Email / Security Assertion Markup Language / Phishing / SAML 2.0 / Qualys / Computer security / Computing / System software

      Security and Privacy Technology & Infrastructure Military Grade Encryption Cotap encrypts data in transit and at rest using AES 256-bit with perfect forward secrecy key

      Add to Reading List

      Source URL: info.cotap.com

      Language: English - Date: 2015-05-24 17:10:19
      20Secure communication / Key management / Transport Layer Security / Public-key cryptography / Perfect forward secrecy / Cipher suite / Secure Shell / Key / Elliptic curve Diffie–Hellman / Cryptography / Cryptographic protocols / Internet protocols

      PDF Document

      Add to Reading List

      Source URL: www.isecpartners.com

      Language: English - Date: 2014-09-04 15:37:42
      UPDATE