Key exchange

Results: 1226



#Item
1Cryptography / Public-key cryptography / Ciphertext indistinguishability / ID-based encryption / Chosen-plaintext attack / RSA / Ciphertext / Proxy re-encryption / Homomorphic encryption / XTR / Key encapsulation / Semantic security

Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange David Derler1 , Kai Gellert2 , Tibor Jager2 , Daniel Slamanig3 , and Christoph Striecks3 1 Graz University of Technology

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2018-03-27 10:44:26
2Cryptography / Computing / Internet / Internet protocols / Public-key cryptography / Transport Layer Security / Secure communication / Cryptographic protocols / QUIC / Transmission Control Protocol / Forward secrecy

Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange David Derler‡ , Tibor Jagerk , Daniel Slamanig§ , Christoph Striecks§ May 3, 2018—Eurocrypt 2018, Tel Aviv, Israel

Add to Reading List

Source URL: david.derler.info

Language: English - Date: 2018-10-15 14:18:42
3Cryptography / Public-key cryptography / Transport Layer Security / Key management / Public key infrastructure / Man-in-the-middle attack / Secure Shell / Forward secrecy / Elliptic-curve DiffieHellman / Replay attack / Cryptographic protocol / Handshaking

Designing a Secret Handshake: Authenticated Key Exchange as a Capability System Dominic Tarr July 10, 2015 Abstract Capability Based Security is a conceptual framework for designing

Add to Reading List

Source URL: dominictarr.github.io

Language: English - Date: 2015-07-10 14:55:46
4Cryptography / Public-key cryptography / Cryptographic protocols / Key management / Public key infrastructure / DiffieHellman key exchange / Key exchange / Forward secrecy / RSA / Secure channel / XTR / Digital signature

A Framework for Universally Composable Diffie-Hellman Key Exchange Ralf K¨usters and Daniel Rausch University of Stuttgart Stuttgart, Germany Email: {ralf.kuesters, daniel.rausch}@informatik.uni-stuttgart.de

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:55:11
5Cryptography / Public-key cryptography / Transport Layer Security / Key management / Public key infrastructure / Man-in-the-middle attack / Secure Shell / Forward secrecy / Elliptic-curve DiffieHellman / Replay attack / Cryptographic protocol / Handshaking

Designing a Secret Handshake: Authenticated Key Exchange as a Capability System Dominic Tarr July 10, 2015 Abstract Capability Based Security is a conceptual framework for designing

Add to Reading List

Source URL: dominictarr.github.io

Language: English - Date: 2015-07-10 14:55:46
6

0-RTT Key Exchange with Full Forward Secrecy Felix Günther Technische Universität Darmstadt, Germany

Add to Reading List

Source URL: rwc.iacr.org

Language: English - Date: 2017-05-31 03:05:39
    7

    Implementing the NewHope-Simple Key Exchange on Low-Cost FPGAs Tobias Oder1 and Tim G¨ uneysu1,2? 1

    Add to Reading List

    Source URL: www.seceng.rub.de

    Language: English - Date: 2018-04-16 04:10:10
      8Cryptography / Post-quantum cryptography / Public-key cryptography / Supersingular isogeny key exchange / Sidh / Elliptic curve cryptography / DiffieHellman key exchange / Isogeny / Elliptic curve / Supersingular variety / Whitfield Diffie / Isogenous

      Practical post-quantum key exchange from the Learning with Errors Problem

      Add to Reading List

      Source URL: rwc.iacr.org

      Language: English - Date: 2018-01-13 06:28:10
      9Cryptography / Post-quantum cryptography / Lattice-based cryptography / Computational hardness assumptions / Learning with errors / Machine learning / Ring learning with errors / Quantum computing / Lattice / XTR / Normal distribution / Transport Layer Security

      Post-quantum key exchange  a new hope

      Add to Reading List

      Source URL: cryptojedi.org

      Language: English - Date: 2015-11-11 17:17:15
      10

      DSO concerns on Key Organisational Requirements, Roles and Responsibilities (KORRR) on data exchange 11 June 2018 Introduction The KORRR methodology proposal, following the implementation of Guideline System Operation (G

      Add to Reading List

      Source URL: www.geode-eu.org

      Language: English - Date: 2018-06-08 11:43:46
        UPDATE