Back to Results
First PageMeta Content
Signcryption / Key management / Diffie–Hellman key exchange / MQV / Perfect forward secrecy / Key Wrap / Three-pass protocol / Station-to-Station protocol / Cryptography / Cryptographic protocols / Public-key cryptography


One-Pass HMQV and Asymmetric Key-Wrapping Shai Halevi Hugo Krawczyk IBM Research December 22, 2010
Add to Reading List

Document Date: 2010-12-22 12:08:05


Open Document

File Size: 349,87 KB

Share Result on Facebook

City

Elgamal / /

Company

IBM / CBC / G0 / /

Currency

pence / /

IndustryTerm

proof-of-possession protocols / storage applications / natural solution / on-line exponentiations / secure systems / desirable protocol / cyclic / signcryption algorithm / access-control systems / backup/restore services / computing / actual protocol / less secure media / correct server / pre-computing / /

Organization

U.S. Securities and Exchange Commission / /

Person

Bob / Alice / Enc / /

Position

player / /

ProgrammingLanguage

C / K / /

ProvinceOrState

California / /

Technology

encryption / basic HOMQV protocol / HOMQV protocol / one-pass key-exchange protocol / one-pass protocols / resulting interactive protocol / one-pass key-exchange protocols / UC-secure messaging protocol / same base protocol / public key / signcryption algorithm / CCA-secure DHIES encryption / PKI / key-exchange protocol / proof-of-possession protocols / typical tape-encryption / private key / dom / one-pass HMQV protocol / secret key / authenticated encryption / interactive protocol / /

SocialTag