Elliptic curve Diffie–Hellman

Results: 62



#Item
1Cryptography / Abstract algebra / Algebra / Computational hardness assumptions / Finite fields / DiffieHellman problem / Group theory / Elliptic curve cryptography / Provable security / Whitfield Diffie / DiffieHellman key exchange / Elliptic curve

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves On the Static Diffie-Hellman Problem on Elliptic Curves over Extension Fields

Add to Reading List

Source URL: 2010.eccworkshop.org

Language: English - Date: 2010-10-25 19:46:00
2Cryptography / Transport Layer Security / Secure communication / Finite fields / Cryptographic protocols / Public-key cryptography / Logjam / DiffieHellman key exchange / Index calculus algorithm / XTR / Elliptic curve DiffieHellman / Key size

Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice

Add to Reading List

Source URL: aaspring.com

Language: English - Date: 2015-08-21 16:58:21
3Transport Layer Security / Secure communication / Finite fields / Cryptographic protocols / Public-key cryptography / Logjam / DiffieHellman key exchange / Index calculus algorithm / XTR / Elliptic curve DiffieHellman / Key size / Safe prime

Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice

Add to Reading List

Source URL: weakdh.org

Language: English - Date: 2015-10-15 14:53:20
4Cryptography / Abstract algebra / Algebra / Finite fields / Public-key cryptography / Computational hardness assumptions / Group theory / DiffieHellman key exchange / Index calculus algorithm / RSA / Discrete logarithm / Elliptic curve cryptography

E-th roots and static Diffie-Hellman using index calculus Antoine Joux1 Joint work with Reynald Lercier2 , David Naccache3 , Emmanuel Thome´ 4 Elliptic Curve Cryptography 2008

Add to Reading List

Source URL: www.hyperelliptic.org

Language: English - Date: 2008-10-04 13:47:14
5Information / NSA Suite B Cryptography / Internet Key Exchange / IPsec / Elliptic curve cryptography / Elliptic curve Diffie–Hellman / Elliptic Curve DSA / Key-agreement protocol / Diffie–Hellman key exchange / Cryptographic protocols / Cryptography / Data

Internet Engineering Task Force (IETF) Request for Comments: 6380 Category: Informational ISSN: K. Burgin

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2011-10-18 14:31:43
6Finite fields / Computational hardness assumptions / Group theory / Diffie–Hellman key exchange / XTR / Secure Shell / Cipher suite / Index calculus algorithm / Elliptic curve Diffie–Hellman / Cryptography / Abstract algebra / Cryptographic protocols

Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice David Adrian¶ Karthikeyan Bhargavan∗ Zakir Durumeric¶ Pierrick Gaudry† Matthew Green§ J. Alex Halderman¶ Nadia Heninger‡ Drew Springall¶ Emmanuel

Add to Reading List

Source URL: weakdh.org

Language: English - Date: 2015-05-22 22:25:48
7Cryptographic protocols / Elliptic curve Diffie–Hellman / Diffie–Hellman key exchange / SHA-1 / SHA-2 / Elliptic Curve DSA / Key derivation function / Key / CRYPTREC / Cryptography / Cryptographic hash functions / Key management

Japan Cryptographic Module Validation Program(JCMVP) Specifications of Cryptographic Algorithm Implementation Testing — Key Establishment Schemes —

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-05-28 08:17:39
8Diffie–Hellman key exchange / Key management / Elliptic curve Diffie–Hellman / Quantum key distribution / RSA / Key exchange / Key / SPEKE / Integrated Encryption Scheme / Cryptography / Cryptographic protocols / Public-key cryptography

CODING CONCEPTS TUTORIAL BEN EVERARD WHY DO THIS? • Understand advanced

Add to Reading List

Source URL: www.linuxvoice.com

Language: English - Date: 2015-01-08 10:21:45
9Key management / Elliptic curve Diffie–Hellman / Elliptic curve cryptography / NTRU / Kirkwood / Key / Cipher / Cryptography / Post-quantum cryptography / Public-key cryptography

Failure is not an Option: Standardization Issues for Post-Quantum Key Agreement

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-03 09:38:35
10Public-key cryptography / Cryptographic protocols / Elliptic curve cryptography / Key size / Elliptic curve Diffie–Hellman / Digital signature / Elliptic Curve DSA / Diffie–Hellman key exchange / Elliptic curve / Cryptography / Key management / Finite fields

Lecture 14: Elliptic Curve Cryptography and Digital Rights Management Lecture Notes on “Computer and Network Security” by Avi Kak () April 23, :55am

Add to Reading List

Source URL: engineering.purdue.edu

Language: English - Date: 2015-04-23 00:56:33
UPDATE