Diffie–Hellman key exchange

Results: 233



#Item
51Group theory / Finite fields / Computational hardness assumptions / Logarithms / Discrete logarithm / Diffie–Hellman problem / Baby-step giant-step / Elliptic curve / Diffie–Hellman key exchange / Abstract algebra / Cryptography / Mathematics

Chapter 10 Number-Theoretic Primitives Number theory is a source of several computational problems that serve as primitives in the design of cryptographic schemes. Asymmetric cryptography in particular relies on these pr

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2009-09-20 23:35:30
52Vector space / Diffie–Hellman key exchange / Algebra / Mathematics / XTR

1 Robustly Secure Two-Party Authenticated Key Exchange from Ring-LWE Xiaopeng Yang, Wenping Ma, and Chengli Zhang

Add to Reading List

Source URL: eprint.iacr.org

Language: English
53Public-key cryptography / Diffie–Hellman key exchange / RSA / Mihir Bellare / XTR / SPEKE / Cryptography / Cryptographic protocols / Electronic commerce

COMPUTATIONAL NUMBER THEORY and ASYMMETRIC CRYPTOGRAPHY Mihir Bellare

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2015-05-03 20:58:58
54Signcryption / Key management / Diffie–Hellman key exchange / MQV / Perfect forward secrecy / Key Wrap / Three-pass protocol / Station-to-Station protocol / Cryptography / Cryptographic protocols / Public-key cryptography

One-Pass HMQV and Asymmetric Key-Wrapping Shai Halevi Hugo Krawczyk IBM Research December 22, 2010

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-22 12:08:05
55XTR / ID-based encryption / Diffie–Hellman key exchange / Weil pairing / RSA / Cyberwarfare / Mathematics / Applied mathematics / Cryptographic protocols / Cryptography / Public-key cryptography

Microsoft Word - Weakness of shim’s New ID-based tripartite multiple-key agreement protocol最終版.doc

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-12-13 03:19:10
56Cryptographic protocols / Group signature / Ring signature / Digital signature / Communications protocol / Diffie–Hellman key exchange / Public key certificate / Cryptography / Public-key cryptography / Key management

Democratic Group Signatures on Example of Joint Ventures This is a full version of the fast abstract which appears at ASIACCS’2006. Mark Manulis Horst-G¨ortz Institute Ruhr-University of Bochum D-44801, Germany

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-12-20 03:49:54
57XDH assumption / Decisional Diffie–Hellman assumption / Electronic money / Public-key cryptography / Proof of knowledge / XTR / Cryptography / Cryptographic protocols / Diffie–Hellman key exchange

Practical Anonymous Divisible E-Cash From Bounded Accumulators? Man Ho Au, Willy Susilo, and Yi Mu Centre for Computer and Information Security Research School of Computer Science and Software Engineering University of W

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-12-09 02:25:32
58Public-key cryptography / Kerberos / Password / Diffie–Hellman key exchange / Shared secret / Key / Cryptography / Cryptographic protocols / Key management

Microsoft Word - Design of hybrid protocol-in password-based three-party key exchange settting.doc

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-11-29 06:14:31
59Key / Public-key cryptography / Ciphertext / Adaptive chosen-ciphertext attack / Diffie–Hellman key exchange / Certificateless cryptography / Cramer–Shoup cryptosystem / Cryptography / ID-based encryption / Chosen-ciphertext attack

On the Security of a Certificateless Public-Key Encryption Zhenfeng Zhang, Dengguo Feng State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing, P.R.China zfzhang@

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-11-23 04:27:14
60Finite fields / Cryptographic protocols / Diffie–Hellman problem / Pairing-based cryptography / Hellman / Diffie–Hellman key exchange / Discrete logarithm / Whitfield Diffie / BLS / Cryptography / Abstract algebra / Computational hardness assumptions

Two novel applications of bilinear groups to ABE encryption Riccardo Longo Department of Mathematics, University of Trento, Italy Chiara Marcolla Department of Mathema

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-12 11:38:03
UPDATE