Three-pass protocol

Results: 13



#Item
1

1996 Paper 9 Question 9 Security Shamir’s three-pass protocol enables Alice to send a message m to Bob in the following way: A → B : mka

Add to Reading List

Source URL: www.cl.cam.ac.uk

- Date: 2014-06-09 10:17:13
    2Cipher / Encryption / Key / Three-pass protocol / Threshold cryptosystem / Cryptography / Public-key cryptography / Ciphertext

    Secure protocols for accountable warrant execution Joshua A. Kroll Edward W. Felten

    Add to Reading List

    Source URL: www.cs.princeton.edu

    Language: English - Date: 2014-04-02 08:24:08
    3Vigenère cipher / Caesar cipher / RSA / Cryptosystem / Index of cryptography articles / Three-pass protocol / Cryptography / Public-key cryptography / Cipher

    CCST9017 Hidden Order in Daily Life: A Mathematical Perspective Lecture 10 Mathematics of Secret Codes

    Add to Reading List

    Source URL: hkumath.hku.hk

    Language: English - Date: 2014-11-18 19:29:03
    4Cipher / Encryption / Key / Three-pass protocol / Threshold cryptosystem / Cryptography / Public-key cryptography / Ciphertext

    Secure protocols for accountable warrant execution Joshua A. Kroll Edward W. Felten

    Add to Reading List

    Source URL: www.cs.princeton.edu

    Language: English - Date: 2014-04-02 08:24:08
    5RSA / XTR / Three-pass protocol / Paillier cryptosystem / Cryptography / Public-key cryptography / Electronic commerce

    I. Introduction Programming Techniques S.L. Graham, R.L. Rivest* Editors

    Add to Reading List

    Source URL: www.cis.upenn.edu

    Language: English - Date: 2013-08-26 16:02:26
    6Signcryption / Key management / Diffie–Hellman key exchange / MQV / Perfect forward secrecy / Key Wrap / Three-pass protocol / Station-to-Station protocol / Cryptography / Cryptographic protocols / Public-key cryptography

    One-Pass HMQV and Asymmetric Key-Wrapping Shai Halevi Hugo Krawczyk IBM Research December 22, 2010

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2010-12-22 12:08:05
    7Cipher / RSA / Advantage / Ciphertext stealing / Three-pass protocol / Cryptography / Public-key cryptography / Electronic commerce

    Multi-Dimensional Range Query over Encrypted Data ∗ Elaine Shi John Bethencourt T-H. Hubert Chan Dawn Song Carnegie Mellon University Abstract We design an encryption scheme called Multi-dimensional

    Add to Reading List

    Source URL: i.cs.hku.hk

    Language: English - Date: 2007-09-09 14:20:24
    8Electronic commerce / Diffie–Hellman key exchange / RSA / XTR / Digital signature / Cipher / Three-pass protocol / SPEKE / Cryptography / Public-key cryptography / Cryptographic protocols

    The history of Non-Secret Encryption by J H ELLIS 1. Public-key cryptography (PKC) has been the subject of much discussion in the open literature since Diffie and Hellman suggested the possibility in their paper of April

    Add to Reading List

    Source URL: cryptocellar.web.cern.ch

    Language: English - Date: 1999-02-19 10:12:53
    9RSA / XTR / Three-pass protocol / Paillier cryptosystem / Cryptography / Public-key cryptography / Electronic commerce

    I. Introduction Programming Techniques S.L. Graham, R.L. Rivest* Editors

    Add to Reading List

    Source URL: www.cs.sfu.ca

    Language: English - Date: 2011-01-13 13:40:13
    10Electronic commerce / Diffie–Hellman key exchange / RSA / XTR / Digital signature / Cipher / Three-pass protocol / SPEKE / Cryptography / Public-key cryptography / Cryptographic protocols

    The history of Non-Secret Encryption y J H Ellis

    Add to Reading List

    Source URL: web.archive.org

    Language: English
    UPDATE