Back to Results
First PageMeta Content
MQV / Diffie–Hellman key exchange / Password Authenticated Key Exchange by Juggling / Key-agreement protocol / Public-key cryptography / Man-in-the-middle attack / Password-authenticated key agreement / Alice and Bob / XTR / Cryptography / Cryptographic protocols / YAK


Document Date: 2010-03-11 17:53:38


Open Document

File Size: 234,69 KB

Share Result on Facebook

City

New York / Cambridge / /

Company

CRC Press / Needham / Thales / /

Country

United Kingdom / /

Currency

USD / pence / /

/

Event

FDA Phase / /

Facility

Building Dependable Distributed Systems / /

IndustryTerm

additive cyclic / agreement protocols / public key protocols / authenticated key agreement protocol / agreement protocol / cyclic / computing / secure and efficient key agreement protocol / interactive identification protocol / early protocols / exhaustive search / wireless networks / cryptographic protocols / crypto protocol / authenticated key agreement protocols / identification protocol / abundant computing resources / signature algorithm / /

NaturalFeature

Tibetan Plateau / /

Organization

Institution of Electrical Engineers / /

Person

Bob / Berkant Ustaoglu / Alfred Menezes / Forward Secrecy / Alice / /

Position

representative for a comparative analysis / Forward / /

Product

one / This / P1363 / YAK2 / H2 / /

ProvinceOrState

New York / California / /

PublishedMedium

IEEE Transactions on Information Theory / Journal of Cryptology / Theory of Computing / /

Technology

key exchange protocol / HMQV key agreement protocols / NAXOS protocol / PKI / past PKAKE protocols / signature algorithm / PK-AKE protocol / interactive identification protocol / PK-AKE protocols / key agreement protocols / Cryptography / authenticated key agreement protocols / Diffie-Hellman protocols / PKAKE protocol / following protocol / STS protocol / public key protocols / digital signature / secure Diffie-Hellman protocol / key-exchange protocols / password-based protocols / key exchange protocols / key agreement protocol / SIG-DH protocol / private key / pdf / crypto protocol / two-pass YAK protocol / Public Key / signature-based PK-AKE protocols / MQV key agreement protocol / http / MQV protocol / YAK protocol / simulation / interactive Schnorr identification protocol / authenticated key agreement protocol / HMQV protocol / embedded processor / Diffie-Hellman protocol / /

URL

http /

SocialTag