MQV

Results: 31



#Item
11Cryptographic Schemes based on Elliptic Curve Pairings Sattam S. Al-Riyami Thesis submitted to the University of London for the degree of Doctor of Philosophy

Cryptographic Schemes based on Elliptic Curve Pairings Sattam S. Al-Riyami Thesis submitted to the University of London for the degree of Doctor of Philosophy

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2004-06-16 10:55:54
12An extended abstract of this work appears in Proceedings of the 5th International Conference (SCN ’06) (6 – 8 september 2006, Maiori, Italy) M. Yung Ed., Springer-Verlag, LNCS 4116, Pages 186–200. A New Key Exchang

An extended abstract of this work appears in Proceedings of the 5th International Conference (SCN ’06) (6 – 8 september 2006, Maiori, Italy) M. Yung Ed., Springer-Verlag, LNCS 4116, Pages 186–200. A New Key Exchang

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2012-11-06 05:29:21
13An extended abstract of this work appears in Proceedings of the 5th International Conference (SCN ’06) (6 – 8 september 2006, Maiori, Italy) M. Yung Ed., Springer-Verlag, LNCS 4116, Pages 156–172. About the Securit

An extended abstract of this work appears in Proceedings of the 5th International Conference (SCN ’06) (6 – 8 september 2006, Maiori, Italy) M. Yung Ed., Springer-Verlag, LNCS 4116, Pages 156–172. About the Securit

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2012-11-06 05:29:21
14Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography

Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography

Add to Reading List

Source URL: nvlpubs.nist.gov

Language: English - Date: 2014-05-20 16:37:31
15http://www.occ.treas.gov/toolkit/newsrelease.aspx?JNR=1&Doc=MQV

http://www.occ.treas.gov/toolkit/newsrelease.aspx?JNR=1&Doc=MQV

Add to Reading List

Source URL: www.occ.gov

Language: English - Date: 2010-11-08 11:12:50
16Introduction  Review of HMQV YAK protocol

Introduction Review of HMQV YAK protocol

Add to Reading List

Source URL: homepages.cs.ncl.ac.uk

Language: English - Date: 2010-01-24 18:10:34
17On Robust Key Agreement Based on Public Key Authentication (Short Paper) Feng Hao Thales E-Security, Cambridge, UK [removed]

On Robust Key Agreement Based on Public Key Authentication (Short Paper) Feng Hao Thales E-Security, Cambridge, UK [removed]

Add to Reading List

Source URL: homepages.cs.ncl.ac.uk

Language: English - Date: 2011-12-25 18:38:22
18SSMS - A Secure SMS Messaging Protocol for the M-Payment Systems † Mohsen Toorani ‡

SSMS - A Secure SMS Messaging Protocol for the M-Payment Systems † Mohsen Toorani ‡

Add to Reading List

Source URL: webpages.iust.ac.ir

Language: English - Date: 2012-03-16 17:40:29
19S TANDARDS FOR E FFICIENT C RYPTOGRAPHY  SEC 1: Elliptic Curve Cryptography

S TANDARDS FOR E FFICIENT C RYPTOGRAPHY SEC 1: Elliptic Curve Cryptography

Add to Reading List

Source URL: www.secg.org

Language: English - Date: 2002-09-13 00:00:00