MQV

Results: 31



#Item
1Two is the fastest prime Thomaz Oliveira 1 Julio L´ opez 2 Diego F. Aranha Francisco Rodr´ıguez-Henr´ıquez 1 1 2

Two is the fastest prime Thomaz Oliveira 1 Julio L´ opez 2 Diego F. Aranha Francisco Rodr´ıguez-Henr´ıquez 1 1 2

Add to Reading List

Source URL: delta.cs.cinvestav.mx

Language: English - Date: 2014-08-19 19:37:37
2An Efficient Identification Protocol and the Knowledge-of-Exponent Assumption J. Wu∗ and D.R. Stinson† David R. Cheriton School of Computer Science University of Waterloo, Waterloo, ON, Canada {j32wu, dstinson}@uwate

An Efficient Identification Protocol and the Knowledge-of-Exponent Assumption J. Wu∗ and D.R. Stinson† David R. Cheriton School of Computer Science University of Waterloo, Waterloo, ON, Canada {j32wu, dstinson}@uwate

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-05-15 09:30:41
3One-Pass HMQV and Asymmetric Key-Wrapping Shai Halevi Hugo Krawczyk IBM Research December 22, 2010

One-Pass HMQV and Asymmetric Key-Wrapping Shai Halevi Hugo Krawczyk IBM Research December 22, 2010

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-22 12:08:05
4TECS WeekProtocol Composition Logic

TECS WeekProtocol Composition Logic

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2005-01-06 04:05:27
5Authenticated Key Exchange over Bitcoin Patrick McCorry, Siamak F. Shahandashti, Dylan Clarke, Feng Hao Newcastle University, UK {patrick.mccorry,siamak.shahandashti,dylan.clarke,feng.hao}@ncl.ac.uk  Abstract. Bitcoin is

Authenticated Key Exchange over Bitcoin Patrick McCorry, Siamak F. Shahandashti, Dylan Clarke, Feng Hao Newcastle University, UK {patrick.mccorry,siamak.shahandashti,dylan.clarke,feng.hao}@ncl.ac.uk Abstract. Bitcoin is

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-03 08:37:15
6Microsoft Word - Certicom secg_patent.dot

Microsoft Word - Certicom secg_patent.dot

Add to Reading List

Source URL: www.secg.org

Language: English - Date: 2015-01-29 09:45:08
7Standards for Efficient Cryptography  SEC 1: Elliptic Curve Cryptography Certicom Research Contact: Daniel R. L. Brown ([removed]) Working Draft

Standards for Efficient Cryptography SEC 1: Elliptic Curve Cryptography Certicom Research Contact: Daniel R. L. Brown ([removed]) Working Draft

Add to Reading List

Source URL: www.secg.org

Language: English - Date: 2015-01-29 09:45:11
8Network Working Group Request for Comments: 3278 Category: Informational S. Blake-Wilson D. Brown

Network Working Group Request for Comments: 3278 Category: Informational S. Blake-Wilson D. Brown

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2002-05-09 20:29:36
9Deniable Authenticated Key Establishment for Internet Protocols Colin Boyd1? and Wenbo Mao2?? and Kenneth G. Paterson3? ? ? 1  Information Security Research Centre, Queensland University of Technology,

Deniable Authenticated Key Establishment for Internet Protocols Colin Boyd1? and Wenbo Mao2?? and Kenneth G. Paterson3? ? ? 1 Information Security Research Centre, Queensland University of Technology,

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2004-04-22 14:15:54
10Authenticated Key Exchange from Ideal Lattices ¨ ur Dagdelen3 Jiang Zhang1 , Zhenfeng Zhang1,∗ , Jintai Ding2,∗ , Michael Snook2 , and Ozg¨ 1  Institute of Software, Chinese Academy of Sciences, China

Authenticated Key Exchange from Ideal Lattices ¨ ur Dagdelen3 Jiang Zhang1 , Zhenfeng Zhang1,∗ , Jintai Ding2,∗ , Michael Snook2 , and Ozg¨ 1 Institute of Software, Chinese Academy of Sciences, China

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-09-30 10:34:44