DiffieHellman key exchange

Results: 25



#Item
11Finite fields / Group theory / Logarithms / Public-key cryptography / Computer algebra / Discrete logarithm / CantorZassenhaus algorithm / Index calculus algorithm / Baby-step giant-step / Exponentiation / DiffieHellman key exchange / Algorithm

Public Key Cryptography Using Discrete Logarithms in Finite Fields: Algorithms, Efficient Implementation and Attacks L. Maurits)

Add to Reading List

Source URL: www.luke.maurits.id.au

Language: English - Date: 2016-04-23 00:53:29
12Public-key cryptography / Cryptographic protocols / Secure communication / Cryptographic software / Double Ratchet Algorithm / DiffieHellman key exchange / WhatsApp / Digital signature / XTR / Elliptic curve DiffieHellman / Signal

How Secure is TextSecure? Tilman Frosch∗† , Christian Mainka† , Christoph Bader† , Florian Bergsma† , J¨org Schwenk† , Thorsten Holz† ∗G DATA Advanced Analytics GmbH {firstname.lastname}@gdata.de

Add to Reading List

Source URL: www.nds.rub.de

Language: English - Date: 2016-05-24 15:16:00
13Cryptography / Computing / Cryptographic protocols / Juniper Networks / Pseudorandom number generators / Cryptographic nonce / Internet protocols / NetScreen Technologies / Challengeresponse authentication / ScreenOS / Internet Key Exchange / DiffieHellman key exchange

A Systematic Analysis of the Juniper Dual EC Incident Stephen Checkoway*, Shaanan Cohney†, Christina Garman‡, Matthew Green‡, Nadia Heninger†, Jacob Maskiewicz§, Eric Rescorla§, Hovav Shacham§, Ralf-Philipp We

Add to Reading List

Source URL: dualec.org

Language: English - Date: 2016-04-15 12:48:33
14Cryptography / Finite fields / Computational hardness assumptions / Password-authenticated key agreement / Password Authenticated Key Exchange by Juggling / SPEKE / DiffieHellman problem / Zero-knowledge proof / XTR / Digital signature / Proof of knowledge

Security of the J-PAKE Password-Authenticated Key Exchange Protocol Michel Abdalla Fabrice Benhamouda

Add to Reading List

Source URL: www.normalesup.org

Language: English - Date: 2015-03-20 08:39:27
15Turing Award laureates / Public-key cryptography / Cryptography / Applied mathematics / Whitfield Diffie / Ralph Merkle / Martin Hellman / DiffieHellman key exchange / Turing Award / Cryptographic protocol / Ron Rivest / Key management

Contact: Jim OrmondCRYPTOGRAPHY PIONEERS RECEIVE ACM A.M. TURING AWARD

Add to Reading List

Source URL: awards.acm.org

Language: English - Date: 2016-03-08 10:06:12
16Cryptography / Abstract algebra / Algebra / Computational hardness assumptions / Finite fields / DiffieHellman problem / Group theory / Elliptic curve cryptography / Provable security / Whitfield Diffie / DiffieHellman key exchange / Elliptic curve

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves On the Static Diffie-Hellman Problem on Elliptic Curves over Extension Fields

Add to Reading List

Source URL: 2010.eccworkshop.org

Language: English - Date: 2010-10-25 19:46:00
17Key management / Public-key cryptography / Cryptography / Elliptic curve cryptography / Key size / Key / Symmetric-key algorithm / RSA / Cipher / Elliptic curve DiffieHellman / DiffieHellman key exchange / Cryptographic key types

CERTICOM WHITEPAPER SERIES ECC and SCADA Key Management Rob Lambert, Certicom August 2010

Add to Reading List

Source URL: www.certicom.com

Language: English - Date: 2010-11-08 15:42:56
18Cryptography / Transport Layer Security / Secure communication / Finite fields / Cryptographic protocols / Public-key cryptography / Logjam / DiffieHellman key exchange / Index calculus algorithm / XTR / Elliptic curve DiffieHellman / Key size

Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice

Add to Reading List

Source URL: aaspring.com

Language: English - Date: 2015-08-21 16:58:21
19Public-key cryptography / Computer security / DolevYao model / DiffieHellman key exchange / Cryptographic protocol / RSA / Exponentiation / DiffieHellman problem / Modular exponentiation

1 On the Symbolic Analysis of Low-Level Cryptographic Primitives: Modular Exponentiation and the Diffie-Hellman Protocol M ARZIA B USCEMI, University of Pisa

Add to Reading List

Source URL: www.qatar.cmu.edu

Language: English - Date: 2004-12-05 23:21:27
20Transport Layer Security / Secure communication / Finite fields / Cryptographic protocols / Public-key cryptography / Logjam / DiffieHellman key exchange / Index calculus algorithm / XTR / Elliptic curve DiffieHellman / Key size / Safe prime

Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice

Add to Reading List

Source URL: weakdh.org

Language: English - Date: 2015-10-15 14:53:20
UPDATE