Key exchange

Results: 1226



#Item
341Information / Password-authenticated key agreement / Cipher suite / Transport Layer Security / Password / Diffie–Hellman problem / Diffie–Hellman key exchange / Public-key cryptography / Encrypted key exchange / Cryptographic protocols / Cryptography / Data

c ACM, 2006. This is the author’s version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in Proceedings of the 2006 ACM Symposi

Add to Reading List

Source URL: www.bmoeller.de

Language: English - Date: 2006-05-22 09:04:49
342Guangdong / Provinces of the People\'s Republic of China / Economy of Hong Kong / Hong Kong / Pearl River / Civic Exchange / Pearl River Delta / Hong Kong-Zhuhai-Macau Bridge / Transport in Macau

Executive Summary According to the analysis by the British Chamber of Commerce theBudget priorities comprise the following key areas: - -

Add to Reading List

Source URL: f8demo-server.functioneight.com

Language: English - Date: 2014-07-07 04:52:13
343Finite fields / Computational complexity theory / Diffie–Hellman problem / ElGamal encryption / Universal hashing / Paillier cryptosystem / Diffie–Hellman key exchange / Cramer–Shoup cryptosystem / Index of cryptography articles / Cryptography / Cryptographic protocols / Public-key cryptography

A new security proof for Damg˚ ard’s ElGamal Kristian Gjøsteen March 17, 2005 Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-03-17 15:37:01
344Public-key cryptography / Cocks IBE scheme / Ciphertext indistinguishability / XTR / Diffie–Hellman key exchange / Random oracle / Cipher / Boneh/Franklin scheme / Feistel cipher / Cryptography / ID-based encryption / Advantage

On the Relations Between Non-Interactive Key Distribution, Identity-Based Encryption and Trapdoor Discrete Log Groups Kenneth G. Paterson and Sriramkrishnan Srinivasan Information Security Group, Royal Holloway, Universi

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-10-12 12:17:42
345Group signature / Accumulator / Proof of knowledge / Diffie–Hellman problem / XTR / Diffie–Hellman key exchange / Zero-knowledge proof / Direct Anonymous Attestation / Cryptography / Cryptographic protocols / Finite fields

An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials Jan Camenisch1 , Markulf Kohlweiss2 , and Claudio Soriente3 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-22 05:56:52
346Public-key cryptography / Password authentication protocol / Key-agreement protocol / Password / Secure Remote Password protocol / Cryptographic protocols / Cryptography / Encrypted key exchange

A weakness in Sun-Chen-Hwang’s three-party key agreement protocols using passwords ? Junghyun Nam, Seungjoo Kim, Dongho Won, School of Information and Communication Engineering, Sungkyunkwan University, 300 Cheoncheon-

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-12-13 20:50:57
347Diffie–Hellman key exchange / Key-agreement protocol / Advantage / Diffie–Hellman problem / Cryptographic nonce / Adversary model / SPEKE / Secure Remote Password protocol / Cryptography / Cryptographic protocols / Random oracle

A preliminary version appears in ISC 2009, Lecture Notes in Computer Science, Springer-Verlag, 2009. This version is dated December 18, 2009. Security Analysis of the PACE Key-Agreement Protocol Jens Bender1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-12-18 06:37:52
348Side channel attack / Advantage / Cryptography / Random oracle / Public-key cryptography

On Continuous After-the-Fact Leakage-Resilient Key Exchange ∗ Mohsen Toorani Department of Informatics

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-20 20:07:33
349Data / Internet protocols / Universal composability / Authentication protocol / Password authentication protocol / Radio-frequency identification / Cryptography / Cryptographic protocols / Information

Universally Composable and Forward Secure RFID Authentication and Authenticated Key Exchange Tri van Le, Mike Burmester, Breno de Medeiros Department of Computer Science, Florida State University Tallahassee, Florida, FL

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-12-05 18:44:49
350Cryptographic protocols / Hashing / Password / Salt / Rainbow table / Hash table / Crypt / Random oracle / SHA-2 / Cryptography / Cryptographic hash functions / Search algorithms

Verifier-Based Password-Authenticated Key Exchange: New Models and Constructions Fabrice Benhamouda and David Pointcheval ENS, Paris, France ?

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-10-14 17:20:37
UPDATE