Forward secrecy

Results: 40



#Item
21Computer security / Denial-of-service attack / Vulnerability / Attack / Malware / Cross-site scripting / Windows / Firefox / Cyberwarfare / Software / Computer network security

Infrastructure Security 1. Infrastructure Security Forward Secrecy In this report, we discuss points to note regarding memory forensics for devices equipped with large amounts

Add to Reading List

Source URL: www.iij.ad.jp

Language: English - Date: 2014-03-27 22:27:18
22Signcryption / Key management / Diffie–Hellman key exchange / MQV / Perfect forward secrecy / Key Wrap / Three-pass protocol / Station-to-Station protocol / Cryptography / Cryptographic protocols / Public-key cryptography

One-Pass HMQV and Asymmetric Key-Wrapping Shai Halevi Hugo Krawczyk IBM Research December 22, 2010

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-22 12:08:05
23Ciphertext indistinguishability / Perfect forward secrecy / Authentication protocol / Cryptography / Cryptographic protocols / Public-key cryptography

Enhancing CK-Model for Key Compromise Impersonation Resilience and Identity-based Key Exchange Robert W. Zhu, Xiaojian Tian, and Duncan S. Wong Department of Computer Science City University of Hong Kong

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-06-13 00:19:02
24Cryptographic protocols / Digital signature / RSA / Diffie–Hellman key exchange / Key-agreement protocol / Cypherpunk / Perfect forward secrecy / Key / Public key infrastructure / Cryptography / Key management / Public-key cryptography

Two Remarks on Public Key Cryptology Ross Anderson University of Cambridge Computer Laboratory, New Museums Site, Pembroke Street, Cambridge CB2 3QG, UK

Add to Reading List

Source URL: cypherspace.org

Language: English - Date: 2003-11-23 22:40:31
25Public-key cryptography / Elliptic curve Diffie–Hellman / Session key / Diffie–Hellman key exchange / Transport Layer Security / Cryptography / Cryptographic protocols / Perfect forward secrecy

February[removed]Perfect Forward Secrecy Introduction 1.

Add to Reading List

Source URL: www.asd.gov.au

Language: English - Date: 2015-02-10 18:11:48
26Money laundering / Organisation for Economic Co-operation and Development / Finance / Financial Action Task Force on Money Laundering / Economics / Terrorism financing / Asia/Pacific Group on Money Laundering / Bank Secrecy Act / Financial regulation / Tax evasion / Business

PART2 International Standards and Way Forward 6

Add to Reading List

Source URL: www.nd.gov.hk

Language: English - Date: 2009-07-02 23:19:13
27Key management / Group Domain of Interpretation / Diffie–Hellman key exchange / Perfect forward secrecy / XTR / Key distribution / Internet Security Association and Key Management Protocol / IPsec / Cryptography / Cryptographic protocols / Public-key cryptography

NRL Release Number[removed]Formalizing GDOI Group Key Management Requirements in NPATRL ∗

Add to Reading List

Source URL: www.nrl.navy.mil

Language: English - Date: 2013-04-29 11:02:45
28Public-key cryptography / Random oracle / Perfect forward secrecy / Transport Layer Security / Standard model / Oracle machine / Key / Digital signature / Advantage / Cryptography / Cryptographic protocols / Key management

One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model Florian Bergsma, Tibor Jager, and J¨org Schwenk Horst G¨ ortz Institute for IT Security

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-09 19:28:13
29Opportunistic encryption / Internet Key Exchange / Perfect forward secrecy / Key-agreement protocol / Security association / ZRTP / X.509 / Public-key cryptography / Domain Name System Security Extensions / Cryptography / Cryptographic protocols / IPsec

Opportunistic Keying as a Countermeasure to Pervasive Monitoring Stephen Kent BBN Technologies Abstract This document was prepared as part of the IETF response to concerns about “pervasive monitoring” (PM) [Farrell-p

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
30HTTP / Data / Computing / Security / Internet protocols / HTTP Secure / Perfect forward secrecy / Cipher suite / Public-key cryptography / Cryptographic protocols / Secure communication / Cryptography

Configuring SSL Securely    With recent revelations about state sponsored intelligence gathering efforts I wanted to capitalize  on our attention to them and suggest a way we, as IT professio

Add to Reading List

Source URL: www.alaska.edu

Language: English - Date: 2014-06-09 20:08:57
UPDATE