Back to Results
First PageMeta Content
Analysis of algorithms / Randomness / Advantage / Randomized algorithm / Adversary model / Pseudorandomness / Transmission Control Protocol / Randomness extractor / Random number generation / Cryptography / Theoretical computer science / Applied mathematics


Authenticated Key Exchange under Bad Randomness? Guomin Yang1 , Shanshan Duan2 , Duncan S. Wong3 , Chik How Tan1 , and Huaxiong Wang4 1 2
Add to Reading List

Document Date: 2011-12-18 22:21:28


Open Document

File Size: 324,95 KB

Share Result on Facebook

Currency

pence / /

/

Facility

National University of Singapore / City University / tsltch}@nus.edu.sg University of California / /

IndustryTerm

important tools / generation algorithm / insecure network / cryptographic protocols / probabilistic algorithm / polynomial time algorithm / probabilistic polynomial time algorithms / authenticated key exchange protocols / upper layer applications / transformed protocol / protocol execution algorithm / /

MusicAlbum

Test / Reveal / Corrupt / Send / /

OperatingSystem

VMs / DoS / Linux / /

Organization

i.e. / National University of Singapore / Nanyang Technological University / City University of Hong Kong / U.S. Securities and Exchange Commission / University of California San Diego / /

Person

Forward Secrecy / /

Position

system administrator / Strong Randomness Extractor / Private / /

ProvinceOrState

NU / Nevada / /

Technology

symmetric key encryption / resettably secure public key encryption / Cryptography / existing AKE protocols / transformed protocol / two probabilistic polynomial time algorithms / public key / secure AKE protocol / polynomial time algorithm / ISO protocol / Linux / SIG-DH Protocols / 2 secure AKE protocol / AKE algorithms / AKE protocols / Diffie-Hellman key exchange protocols / MQV protocol / private key / secret key / SIGMA protocol / Long-Lived Key generation algorithm / hedged protocols / digital signature / operating systems / protocol execution algorithm / HMQV protocol / authenticated key exchange protocols / probabilistic algorithm / AKE protocol / /

SocialTag