Forward secrecy

Results: 40



#Item
1Revisiting Proxy Re-Encryption: Forward Secrecy, Improved Security, and Applications David Derler1 , Stephan Krenn2 , Thomas Lor¨ unser2 , Sebastian Ramacher1 , 2 Daniel Slamanig , and Christoph Striecks2

Revisiting Proxy Re-Encryption: Forward Secrecy, Improved Security, and Applications David Derler1 , Stephan Krenn2 , Thomas Lor¨ unser2 , Sebastian Ramacher1 , 2 Daniel Slamanig , and Christoph Striecks2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2018-05-03 11:03:06
2Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice

Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice

Add to Reading List

Source URL: benvds.com

Language: English - Date: 2018-09-18 11:06:16
    30-RTT Key Exchange with Full Forward Secrecy Felix Günther Technische Universität Darmstadt, Germany

    0-RTT Key Exchange with Full Forward Secrecy Felix Günther Technische Universität Darmstadt, Germany

    Add to Reading List

    Source URL: rwc.iacr.org

    Language: English - Date: 2017-05-31 03:05:39
      4Intro to Onion Routing Sphinx: A Compact and Provably Secure Mix Format HORNET: High-speed Onion Routing at the Network Layer Forward Secrecy Security Assumptions Future Directions

      Intro to Onion Routing Sphinx: A Compact and Provably Secure Mix Format HORNET: High-speed Onion Routing at the Network Layer Forward Secrecy Security Assumptions Future Directions

      Add to Reading List

      Source URL: scalingbitcoin.org

      Language: English - Date: 2016-10-08 10:07:33
        5Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice

        Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice

        Add to Reading List

        Source URL: benjaminvandersloot.com

        Language: English - Date: 2018-05-07 11:00:06
          6Imperfect Forward Secrecy How Diffie-Hellman Fails in Practice David Adrian, Karthikeyan Bhargavan, Zakir Durumeric, Pierrick Gaudry, Matthew Green, J. Alex Halderman, Nadia Heninger, Drew Springall, Emmanuel Thom´e,

          Imperfect Forward Secrecy How Diffie-Hellman Fails in Practice David Adrian, Karthikeyan Bhargavan, Zakir Durumeric, Pierrick Gaudry, Matthew Green, J. Alex Halderman, Nadia Heninger, Drew Springall, Emmanuel Thom´e,

          Add to Reading List

          Source URL: ecc2015.math.u-bordeaux1.fr

          - Date: 2015-09-27 09:29:28
            7Proceedings  - NN - Password Authenticated Key Agreement for Contactless Smart Cards

            Proceedings - NN - Password Authenticated Key Agreement for Contactless Smart Cards

            Add to Reading List

            Source URL: events.iaik.tugraz.at

            Language: English - Date: 2008-07-17 01:45:53
            8Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice

            Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice

            Add to Reading List

            Source URL: weakdh.org.

            Language: English - Date: 2015-10-15 14:53:20
              9Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice

              Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice

              Add to Reading List

              Source URL: aaspring.com

              Language: English - Date: 2015-08-21 16:58:21
              10Factoring RSA Keys With TLS Perfect Forward Secrecy Florian Weimer Red Hat Product Security SeptemberAbstract

              Factoring RSA Keys With TLS Perfect Forward Secrecy Florian Weimer Red Hat Product Security SeptemberAbstract

              Add to Reading List

              Source URL: people.redhat.com

              Language: English - Date: 2015-09-02 09:27:18