Diffie–Hellman key exchange

Results: 233



#Item
41Diffie–Hellman key exchange / RSA / XTR / Password / Key / Secure Remote Password protocol / Password-authenticated key agreement / Cryptography / Cryptographic protocols / SPEKE

Secure Sessions from Weak Secrets Michael Roe1 Bruce Christianson2 David Wheeler3 1

Add to Reading List

Source URL: www.chiark.greenend.org.uk

Language: English - Date: 2010-08-20 09:24:39
42Computing / Password-authenticated key agreement / Diffie–Hellman key exchange / XTR / Diffie–Hellman problem / File Transfer Protocol / Password / Password Authenticated Key Exchange by Juggling / Secure Remote Password protocol / Cryptographic protocols / Cryptography / Data

A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol ? SeongHan Shin1 , Kazukuni Kobara1 , and Hideki Imai2,1 1 Research Center for Information Security (RCIS),

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-21 19:36:43
43Information / Password-authenticated key agreement / Cipher suite / Transport Layer Security / Password / Diffie–Hellman problem / Diffie–Hellman key exchange / Public-key cryptography / Encrypted key exchange / Cryptographic protocols / Cryptography / Data

c ACM, 2006. This is the author’s version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in Proceedings of the 2006 ACM Symposi

Add to Reading List

Source URL: www.bmoeller.de

Language: English - Date: 2006-05-22 09:04:49
44Finite fields / Computational complexity theory / Diffie–Hellman problem / ElGamal encryption / Universal hashing / Paillier cryptosystem / Diffie–Hellman key exchange / Cramer–Shoup cryptosystem / Index of cryptography articles / Cryptography / Cryptographic protocols / Public-key cryptography

A new security proof for Damg˚ ard’s ElGamal Kristian Gjøsteen March 17, 2005 Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-03-17 15:37:01
45Public-key cryptography / Cocks IBE scheme / Ciphertext indistinguishability / XTR / Diffie–Hellman key exchange / Random oracle / Cipher / Boneh/Franklin scheme / Feistel cipher / Cryptography / ID-based encryption / Advantage

On the Relations Between Non-Interactive Key Distribution, Identity-Based Encryption and Trapdoor Discrete Log Groups Kenneth G. Paterson and Sriramkrishnan Srinivasan Information Security Group, Royal Holloway, Universi

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-10-12 12:17:42
46Group signature / Accumulator / Proof of knowledge / Diffie–Hellman problem / XTR / Diffie–Hellman key exchange / Zero-knowledge proof / Direct Anonymous Attestation / Cryptography / Cryptographic protocols / Finite fields

An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials Jan Camenisch1 , Markulf Kohlweiss2 , and Claudio Soriente3 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-22 05:56:52
47Diffie–Hellman key exchange / Key-agreement protocol / Advantage / Diffie–Hellman problem / Cryptographic nonce / Adversary model / SPEKE / Secure Remote Password protocol / Cryptography / Cryptographic protocols / Random oracle

A preliminary version appears in ISC 2009, Lecture Notes in Computer Science, Springer-Verlag, 2009. This version is dated December 18, 2009. Security Analysis of the PACE Key-Agreement Protocol Jens Bender1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-12-18 06:37:52
48Public-key cryptography / Key-agreement protocol / Information / Cyberwarfare / Computing / Cryptographic protocols / Certificateless cryptography / Diffie–Hellman key exchange

Cryptanalysis of an efficient certificateless two-party authenticated key agreement protocol Qingfeng Cheng Luoyang University of Foreign Languages, Luoyang, PR China

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-28 03:05:00
49Computational hardness assumptions / Diffie–Hellman key exchange / Diffie–Hellman problem / Weil pairing / ID-based encryption / Password authentication protocol / Public-key cryptography / Boneh/Franklin scheme / Cryptography / Cryptographic protocols / Finite fields

Improvement of Ma ni ke ta l .

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-12-09 05:56:33
50Password / Challenge-response authentication / Diffie–Hellman key exchange / Public-key cryptography / Password Authenticated Key Exchange by Juggling / Zero-knowledge password proof / Cryptographic protocols / Cryptography / Password-authenticated key agreement

Password-Authenticated Multi-Party Key Exchange with Different Passwords Jeong Ok Kwon† , Ik Rae Jeong§ , Kouichi Sakurai‡ , and Dong Hoon Lee† † Center for Information Security Technologies (CIST), Korea Unive

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-12-25 07:03:53
UPDATE