Key exchange

Results: 1226



#Item
361XTR / ID-based encryption / Diffie–Hellman key exchange / Weil pairing / RSA / Cyberwarfare / Mathematics / Applied mathematics / Cryptographic protocols / Cryptography / Public-key cryptography

Microsoft Word - Weakness of shim’s New ID-based tripartite multiple-key agreement protocol最終版.doc

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-12-13 03:19:10
362

Authenticated Key Exchange and Key Encapsulation Without Random Oracles Tatsuaki Okamoto NTT, Midori-cho, Musashino-shi, Tokyo, Japan December 26, 2007

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-12-26 03:18:35
    363Data / Information / Secure communication / Internet standards / Electronic commerce / Transport Layer Security / Authentication protocol / Cipher suite / Password authentication protocol / Cryptographic protocols / Cryptography / Internet protocols

    Generic Compilers for Authenticated Key Exchange∗ Tibor Jager Florian Kohlar Sven Sch¨age

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2012-08-02 08:15:58
    364Cryptographic protocols / Group signature / Ring signature / Digital signature / Communications protocol / Diffie–Hellman key exchange / Public key certificate / Cryptography / Public-key cryptography / Key management

    Democratic Group Signatures on Example of Joint Ventures This is a full version of the fast abstract which appears at ASIACCS’2006. Mark Manulis Horst-G¨ortz Institute Ruhr-University of Bochum D-44801, Germany

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2005-12-20 03:49:54
    365XDH assumption / Decisional Diffie–Hellman assumption / Electronic money / Public-key cryptography / Proof of knowledge / XTR / Cryptography / Cryptographic protocols / Diffie–Hellman key exchange

    Practical Anonymous Divisible E-Cash From Bounded Accumulators? Man Ho Au, Willy Susilo, and Yi Mu Centre for Computer and Information Security Research School of Computer Science and Software Engineering University of W

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2007-12-09 02:25:32
    366Ciphertext indistinguishability / Perfect forward secrecy / Authentication protocol / Cryptography / Cryptographic protocols / Public-key cryptography

    Enhancing CK-Model for Key Compromise Impersonation Resilience and Identity-based Key Exchange Robert W. Zhu, Xiaojian Tian, and Duncan S. Wong Department of Computer Science City University of Hong Kong

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2006-06-13 00:19:02
    367Public-key cryptography / Kerberos / Password / Diffie–Hellman key exchange / Shared secret / Key / Cryptography / Cryptographic protocols / Key management

    Microsoft Word - Design of hybrid protocol-in password-based three-party key exchange settting.doc

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2006-11-29 06:14:31
    368Key / Public-key cryptography / Ciphertext / Adaptive chosen-ciphertext attack / Diffie–Hellman key exchange / Certificateless cryptography / Cramer–Shoup cryptosystem / Cryptography / ID-based encryption / Chosen-ciphertext attack

    On the Security of a Certificateless Public-Key Encryption Zhenfeng Zhang, Dengguo Feng State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing, P.R.China zfzhang@

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2005-11-23 04:27:14
    369Finite fields / Cryptographic protocols / Diffie–Hellman problem / Pairing-based cryptography / Hellman / Diffie–Hellman key exchange / Discrete logarithm / Whitfield Diffie / BLS / Cryptography / Abstract algebra / Computational hardness assumptions

    Two novel applications of bilinear groups to ABE encryption Riccardo Longo Department of Mathematics, University of Trento, Italy Chiara Marcolla Department of Mathema

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2014-12-12 11:38:03
    370Analysis of algorithms / Randomness / Advantage / Randomized algorithm / Adversary model / Pseudorandomness / Transmission Control Protocol / Randomness extractor / Random number generation / Cryptography / Theoretical computer science / Applied mathematics

    Authenticated Key Exchange under Bad Randomness? Guomin Yang1 , Shanshan Duan2 , Duncan S. Wong3 , Chik How Tan1 , and Huaxiong Wang4 1 2

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2011-12-18 22:21:28
    UPDATE