Three-pass protocol

Results: 13



#Item
11996 Paper 9 Question 9  Security Shamir’s three-pass protocol enables Alice to send a message m to Bob in the following way: A → B : mka

1996 Paper 9 Question 9 Security Shamir’s three-pass protocol enables Alice to send a message m to Bob in the following way: A → B : mka

Add to Reading List

Source URL: www.cl.cam.ac.uk

- Date: 2014-06-09 10:17:13
    2Secure protocols for accountable warrant execution Joshua A. Kroll  Edward W. Felten

    Secure protocols for accountable warrant execution Joshua A. Kroll Edward W. Felten

    Add to Reading List

    Source URL: www.cs.princeton.edu

    Language: English - Date: 2014-04-02 08:24:08
    3CCST9017 Hidden Order in Daily Life: A Mathematical Perspective Lecture 10 Mathematics of Secret Codes

    CCST9017 Hidden Order in Daily Life: A Mathematical Perspective Lecture 10 Mathematics of Secret Codes

    Add to Reading List

    Source URL: hkumath.hku.hk

    Language: English - Date: 2014-11-18 19:29:03
    4Secure protocols for accountable warrant execution Joshua A. Kroll  Edward W. Felten

    Secure protocols for accountable warrant execution Joshua A. Kroll Edward W. Felten

    Add to Reading List

    Source URL: www.cs.princeton.edu

    Language: English - Date: 2014-04-02 08:24:08
    5I. Introduction Programming Techniques S.L. Graham, R.L. Rivest* Editors

    I. Introduction Programming Techniques S.L. Graham, R.L. Rivest* Editors

    Add to Reading List

    Source URL: www.cis.upenn.edu

    Language: English - Date: 2013-08-26 16:02:26
    6One-Pass HMQV and Asymmetric Key-Wrapping Shai Halevi Hugo Krawczyk IBM Research December 22, 2010

    One-Pass HMQV and Asymmetric Key-Wrapping Shai Halevi Hugo Krawczyk IBM Research December 22, 2010

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2010-12-22 12:08:05
    7Multi-Dimensional Range Query over Encrypted Data ∗ Elaine Shi John Bethencourt T-H. Hubert Chan Dawn Song Carnegie Mellon University Abstract We design an encryption scheme called Multi-dimensional

    Multi-Dimensional Range Query over Encrypted Data ∗ Elaine Shi John Bethencourt T-H. Hubert Chan Dawn Song Carnegie Mellon University Abstract We design an encryption scheme called Multi-dimensional

    Add to Reading List

    Source URL: i.cs.hku.hk

    Language: English - Date: 2007-09-09 14:20:24
    8The history of Non-Secret Encryption by J H ELLIS 1. Public-key cryptography (PKC) has been the subject of much discussion in the open literature since Diffie and Hellman suggested the possibility in their paper of April

    The history of Non-Secret Encryption by J H ELLIS 1. Public-key cryptography (PKC) has been the subject of much discussion in the open literature since Diffie and Hellman suggested the possibility in their paper of April

    Add to Reading List

    Source URL: cryptocellar.web.cern.ch

    Language: English - Date: 1999-02-19 10:12:53
    9I. Introduction Programming Techniques S.L. Graham, R.L. Rivest* Editors

    I. Introduction Programming Techniques S.L. Graham, R.L. Rivest* Editors

    Add to Reading List

    Source URL: www.cs.sfu.ca

    Language: English - Date: 2011-01-13 13:40:13
    10The history of Non-Secret Encryption y J H Ellis

    The history of Non-Secret Encryption y J H Ellis

    Add to Reading List

    Source URL: web.archive.org

    Language: English