Perfect forward secrecy

Results: 22



#Item
11Key management / Group Domain of Interpretation / Diffie–Hellman key exchange / Perfect forward secrecy / XTR / Key distribution / Internet Security Association and Key Management Protocol / IPsec / Cryptography / Cryptographic protocols / Public-key cryptography

NRL Release Number[removed]Formalizing GDOI Group Key Management Requirements in NPATRL ∗

Add to Reading List

Source URL: www.nrl.navy.mil

Language: English - Date: 2013-04-29 11:02:45
12Public-key cryptography / Random oracle / Perfect forward secrecy / Transport Layer Security / Standard model / Oracle machine / Key / Digital signature / Advantage / Cryptography / Cryptographic protocols / Key management

One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model Florian Bergsma, Tibor Jager, and J¨org Schwenk Horst G¨ ortz Institute for IT Security

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-09 19:28:13
13Opportunistic encryption / Internet Key Exchange / Perfect forward secrecy / Key-agreement protocol / Security association / ZRTP / X.509 / Public-key cryptography / Domain Name System Security Extensions / Cryptography / Cryptographic protocols / IPsec

Opportunistic Keying as a Countermeasure to Pervasive Monitoring Stephen Kent BBN Technologies Abstract This document was prepared as part of the IETF response to concerns about “pervasive monitoring” (PM) [Farrell-p

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
14HTTP / Data / Computing / Security / Internet protocols / HTTP Secure / Perfect forward secrecy / Cipher suite / Public-key cryptography / Cryptographic protocols / Secure communication / Cryptography

Configuring SSL Securely    With recent revelations about state sponsored intelligence gathering efforts I wanted to capitalize  on our attention to them and suggest a way we, as IT professio

Add to Reading List

Source URL: www.alaska.edu

Language: English - Date: 2014-06-09 20:08:57
15HTTP / Data / Computing / Security / Internet protocols / HTTP Secure / Perfect forward secrecy / Cipher suite / Public-key cryptography / Cryptographic protocols / Secure communication / Cryptography

Configuring SSL Securely    With recent revelations about state sponsored intelligence gathering efforts I wanted to capitalize  on our attention to them and suggest a way we, as IT professio

Add to Reading List

Source URL: info.alaska.edu

Language: English - Date: 2014-06-09 20:08:57
16MQV / Key-agreement protocol / Diffie–Hellman key exchange / Perfect forward secrecy / Digital signature / Diffie–Hellman problem / Whitfield Diffie / Cryptography / Cryptographic protocols / Public-key cryptography

Cryptographic Schemes based on Elliptic Curve Pairings Sattam S. Al-Riyami Thesis submitted to the University of London for the degree of Doctor of Philosophy

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2004-06-16 10:55:54
17Oracle Database / Concrete security / Universal composability / Perfect forward secrecy / Ciphertext indistinguishability / Random oracle / Cryptography / Cryptographic protocols / Oracle machine

International Workshop on Security – Proceedings of IWSEC ’07 (October 29–[removed], Nara, Japan) A. Miyaji, H. Kikuchi and K. Rannenberg, Eds. Springer-Verlag, LNCS 4752, pages 292–307. On Security Models and Comp

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2012-11-06 05:29:19
18Random oracle / Public-key cryptography / Authentication protocol / Smart card / Key-agreement protocol / Perfect forward secrecy / Cryptography / Cryptographic protocols / Advantage

A Cryptographic Analysis of OPACITY ¨ ur Dagdelen Ozg¨ Marc Fischlin Tommaso Gagliardoni Giorgia Azzurra Marson

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-04-22 11:29:49
19Key-agreement protocol / Diffie–Hellman key exchange / Public-key cryptography / Key management / Perfect forward secrecy / Password authentication protocol / Man-in-the-middle attack / YAK / SILC / Cryptography / Cryptographic protocols / MQV

Overview of Key Agreement Protocols Ratna Dutta and Rana Barua Stat-Math Unit

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-10-04 07:51:24
UPDATE