Key-agreement protocol

Results: 124



#Item
111Information / Password Authenticated Key Exchange by Juggling / Password-authenticated key agreement / SPEKE / Password / Encrypted key exchange / Key-agreement protocol / Diffie–Hellman key exchange / Salt / Cryptographic protocols / Cryptography / Data

J-PAKE: Authenticated Key Exchange Without PKI Feng Hao1 and Peter Ryan2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-10-25 17:14:17
112Quantum information science / Cryptographic protocols / Quantum key distribution / Secure Communication based on Quantum Cryptography / Symmetric-key algorithm / Public-key cryptography / Key size / Key distribution / Key-agreement protocol / Cryptography / Key management / Quantum cryptography

SECOQC White Paper on Quantum Key Distribution and Cryptography

Add to Reading List

Source URL: www.secoqc.net

Language: English - Date: 2008-05-06 12:12:25
113Key-agreement protocol / Diffie–Hellman key exchange / Public-key cryptography / Key management / Perfect forward secrecy / Password authentication protocol / Man-in-the-middle attack / YAK / SILC / Cryptography / Cryptographic protocols / MQV

Overview of Key Agreement Protocols Ratna Dutta and Rana Barua Stat-Math Unit

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-10-04 07:51:24
114Key-agreement protocol / MQV / Public-key cryptography / XTR / Computational Diffie–Hellman assumption / Advantage / Perfect forward secrecy / Diffie–Hellman problem / Ciphertext indistinguishability / Cryptography / Cryptographic protocols / Diffie–Hellman key exchange

Strongly-Secure Identity-based Key Agreement and Anonymous Extension Sherman S.M. Chow1 and Kim-Kwang Raymond Choo2,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-01-03 02:55:34
115Off-the-Record Messaging / Key-agreement protocol / Diffie–Hellman key exchange / Public-key cryptography / Secure communication / Man-in-the-middle attack / Secure Shell / MQV / Internet Key Exchange / Cryptographic protocols / Cryptography / Deniable authentication

Secure Off-the-Record Messaging Mario Di Raimondo

Add to Reading List

Source URL: www.dmi.unict.it

Language: English - Date: 2005-09-03 05:31:59
116Public-key cryptography / Encryption / X.509 / Key generation / Key-agreement protocol / Key / Secure communication / SecMsg / Cryptographic key types / Cryptography / Key management / Cryptographic protocols

Security needs in embedded systems Anoop MS Tata Elxsi Ltd. India

Add to Reading List

Source URL: www.infosecwriters.com

Language: English - Date: 2008-05-07 10:04:38
117Cryptography standards / Implicit certificate / MQV / SECG / Research In Motion / Elliptic Curve DSA / Key-agreement protocol / Digital signature / ECC patents / Cryptography / Public-key cryptography / Cryptographic protocols

Microsoft Word - Certicom secg_patent.dot

Add to Reading List

Source URL: www.secg.org

Language: English - Date: 2015-04-04 11:37:53
118SECG / MQV / Research In Motion / Patent / Key-agreement protocol / ECC patents / Elliptic curve cryptography / Cryptography / Public-key cryptography / Cryptography standards

PDF Document

Add to Reading List

Source URL: www.secg.org

Language: English - Date: 2002-08-09 00:00:00
119Public-key cryptography / Elliptic curve cryptography / Diffie–Hellman key exchange / MQV / Static key / Ephemeral key / Key-agreement protocol / Key / NSA Suite B Cryptography / Cryptography / Key management / Cryptographic protocols

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-06 14:56:08
UPDATE