Key exchange

Results: 1226



#Item
111

An abridged version of this paper is under submission. This is the full version. Downgrade Resilience in Key-Exchange Protocols Karthikeyan Bhargavan ∗

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2016-01-26 16:36:16
    112Financial regulation / Economy / International finance institutions / International Organization of Securities Commissions / Securities commission / Government / Securities Commission of New Zealand / Comisin Nacional del Mercado de Valores / Trinidad and Tobago Securities and Exchange Commission

    IOSCO plays a key role in responding to global securities markets’ challenges

    Add to Reading List

    Source URL: www.iosco.org

    Language: English - Date: 2016-02-22 03:57:07
    113Key management / Public-key cryptography / Cryptography / Elliptic curve cryptography / Key size / Key / Symmetric-key algorithm / RSA / Cipher / Elliptic curve DiffieHellman / DiffieHellman key exchange / Cryptographic key types

    CERTICOM WHITEPAPER SERIES ECC and SCADA Key Management Rob Lambert, Certicom August 2010

    Add to Reading List

    Source URL: www.certicom.com

    Language: English - Date: 2010-11-08 15:42:56
    114

    Automatically Verified Mechanized Proof of One-Encryption Key Exchange

    Add to Reading List

    Source URL: prosecco.gforge.inria.fr

    Language: English - Date: 2012-10-01 07:25:55
      115Cryptography / Computer access control / Cryptographic protocols / Password-authenticated key agreement / Password / Passwd / Encrypted key exchange / Crypt / Password Authenticated Key Exchange by Juggling

      Oblivious PAKE: Efficient Handling of Password Trials F. Kiefer, M. Manulis

      Add to Reading List

      Source URL: isc2015.item.ntnu.no

      Language: English - Date: 2015-09-19 12:50:59
      116

      Merkle Puzzles are Optimal — an O(n2)-query attack on key exchange from a random oracle Boaz Barak∗ Mohammad Mahmoody-Ghidary† April 18, 2009

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2009-04-19 19:54:55
        117Software / Computing / System software / IPsec / Computer network security / Virtual private networks / Cryptographic software / Key management / StrongSwan / Internet Key Exchange / NetworkManager / Maemo

        The Open Source VPN Solution for Mobile Platforms  Fully Integrated NetworkManager Applets for the Gnome and KDE 4 Plasma Linux Desktops.  strongSwan Applets for Android and Nokia Maemo.

        Add to Reading List

        Source URL: www.strongswan.org

        Language: English - Date: 2010-06-11 08:23:07
        118

        Lockpicking Physical Layer Key Exchange: Weak Adversary Models Invite the Thief Daniel Steinmetzer Matthias Schulz

        Add to Reading List

        Source URL: www.informatik.tu-darmstadt.de

        Language: English - Date: 2015-05-13 06:54:01
          119IPsec / Cryptographic protocols / Virtual private networks / Computer network security / Cryptographic software / StrongSwan / Internet Key Exchange / FreeS/WAN / Security association / Openswan

          strongSwan VPNs scalable and modularized! Andreas Steffen Copyright © 2008 by Andreas Steffen

          Add to Reading List

          Source URL: www.strongswan.org

          Language: English - Date: 2008-05-05 12:09:19
          120

          Computationally sound compositional logic for key exchange protocols ∗ Anupam Datta, Ante Derek, John C. Mitchell Dept. Computer Science, Stanford University {danupam, aderek, mitchell}@cs.stanford.edu Abstract

          Add to Reading List

          Source URL: www.cs.bris.ac.uk

          Language: English - Date: 2007-01-08 08:20:04
            UPDATE