Key exchange

Results: 1226



#Item
371Advantage / Adversary model / Diffie–Hellman problem / Random oracle / Cryptography / Cryptographic protocols / Cryptographic hash functions

Strongly Secure Authenticated Key Exchange Protocol Based on Computational Diffie-Hellman Problem Hai Huang and Zhenfu Cao Department of Computer Science and Engineering, Shanghai Jiaotong University, 800 Dongchuan Road,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-11-27 03:18:55
372Electronic commerce / Learning with errors / Machine learning / XTR / Normal distribution / Diffie–Hellman key exchange / Diffie–Hellman problem / RSA / Cryptography / Cryptographic protocols / Finite fields

A Simple Provably Secure Key Exchange Scheme Based on the Learning with Errors Problem Jintai Ding, Xiang Xie, Xiaodong Lin University of Cincinnati Chinese Academy of Sciences Rutgers University

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-07-29 14:01:16
373Funds / Financial services / Collective investment schemes / Financial markets / Bank of China / Exchange-traded fund / Performance fee / Rate of return / Net asset value / Financial economics / Investment / Finance

PRODUCT KEY FACTS BOCHK China Golden Dragon Fund a sub-fund of the BOCHK Investment funds 2 September 2013 Issuer: BOCI-Prudential Asset Management Limited

Add to Reading List

Source URL: www.bocgroup.com

Language: English - Date: 2014-10-23 23:09:00
374Random oracle / Password / ID-based encryption / Key-agreement protocol / Advantage / Public-key cryptography / Semantic security / Password Authenticated Key Exchange by Juggling / Cryptography / Cryptographic protocols / Password-authenticated key agreement

ID-Based Group Password-Authenticated Key Exchange Xun Yi1 , Raylin Tso2 , and Eiji Okamoto2 1 School of Engineering and Science

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-04 01:09:45
375Transmission Control Protocol / Public-key cryptography / Cryptography / Cryptographic protocols / Diffie–Hellman key exchange

On the security of a group key agreement protocol Qiang Tang ´ D´epartement d’Informatique, Ecole Normale Sup´erieure 45 Rue d’Ulm, 75230 Paris Cedex 05, France

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-12-12 15:34:38
376Gross domestic product / Exchange rate / Consumer price index / Inflation / Money supply / Economics / Macroeconomics / National accounts

KEY ECONOMIC INDICATORS CENTRAL BANK OF SRI LANKA KEY ECONOMIC INDICATORS Indicator

Add to Reading List

Source URL: www.cbsl.gov.lk

Language: English - Date: 2014-10-24 00:47:16
377Corporate finance / City Gas / Trust law / Singapore Exchange / Initial public offering / Tax / Law / CitySpring Infrastructure Trust / Economy of Singapore

13 May 2007 For Immediate Release CITYSPRING INFRASTRUCTURE TRUST’S INAUGURAL RESULTS FOR THE PERIOD ENDED 31 MARCH 2007 Key Highlights: •

Add to Reading List

Source URL: www.cityspring.com.sg

Language: English - Date: 2013-07-16 02:51:22
378Diffie–Hellman key exchange / Learning with errors / XTR / Onion routing / Homomorphic encryption / Transport Layer Security / RSA / Cryptography / Cryptographic protocols / Electronic commerce

Post-Quantum Secure Onion Routing (Future Anonymity in Today’s Budget) Satrajit Ghosh† † Aniket Kate‡

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-09 11:34:21
379Computer network security / Kerberos / Diffie–Hellman key exchange / Cipher suite / Elliptic curve Diffie–Hellman / Shared secret / Whitfield Diffie / Ticket Granting Ticket / Key exchange / Cryptography / Cryptographic protocols / Key management

draft-vanrein-krb5-kdh-00 - KRB5-KDH: Cryptographically binding Kerberos5 with Diffie-Hellman

Add to Reading List

Source URL: tools.ietf.org

Language: English - Date: 2015-04-26 16:01:52
380Internet privacy / Cryptographic software / Off-the-Record Messaging / Diffie–Hellman key exchange / Key exchange / Man-in-the-middle attack / Deniable authentication / Digital signature / SecureIM / Cryptography / Cryptographic protocols / Public-key cryptography

Off-the-Record Communication, or, Why Not To Use PGP Nikita Borisov UC Berkeley Ian Goldberg

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2004-12-12 23:04:41
UPDATE