Elliptic curve Diffie–Hellman

Results: 62



#Item
21Public-key cryptography / Elliptic curve Diffie–Hellman / Diffie–Hellman key exchange / YAK / Electronic money / Digital signature / Elliptic Curve DSA / MQV / Shared secret / Cryptography / Cryptographic protocols / Bitcoin

Authenticated Key Exchange over Bitcoin Patrick McCorry, Siamak F. Shahandashti, Dylan Clarke, Feng Hao Newcastle University, UK {patrick.mccorry,siamak.shahandashti,dylan.clarke,feng.hao}@ncl.ac.uk Abstract. Bitcoin is

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-03 08:37:15
22RSA / Finite fields / Elliptic Curve DSA / Diffie–Hellman key exchange / Digital signature / Digital Signature Algorithm / SHA-1 / Subliminal channels / ElGamal signature scheme / Cryptography / Public-key cryptography / Electronic commerce

Lattice-based Fault Attacks on DSA - Another Possible Strategy

Add to Reading List

Source URL: crypto.hyperlink.cz

Language: English - Date: 2005-08-29 10:42:00
23Subliminal channels / Diffie–Hellman key exchange / Elliptic Curve DSA / Digital signature / Digital Signature Algorithm / One-time pad / ElGamal signature scheme / Random number generator attack / Cryptography / Public-key cryptography / RSA

Cryptographic Insecurity of the Test&Repeat Paradigm

Add to Reading List

Source URL: crypto.hyperlink.cz

Language: English - Date: 2005-08-29 10:42:00
24Public-key cryptography / Elliptic curve Diffie–Hellman / Session key / Diffie–Hellman key exchange / Transport Layer Security / Cryptography / Cryptographic protocols / Perfect forward secrecy

February[removed]Perfect Forward Secrecy Introduction 1.

Add to Reading List

Source URL: www.asd.gov.au

Language: English - Date: 2015-02-10 18:11:48
25Elliptic curve cryptography / Cryptographic protocols / Elliptic curve Diffie–Hellman / Elliptic Curve DSA / Key / MQV / Digital signature / Cryptographic Message Syntax / NSA Suite B Cryptography / Cryptography / Public-key cryptography / Key management

Network Working Group Request for Comments: 3278 Category: Informational S. Blake-Wilson D. Brown

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2002-05-09 20:29:36
26Pairing / Boneh/Franklin scheme / Elliptic curve cryptography / Diffie–Hellman problem / Elliptic curve / ID-based encryption / Tate pairing / BLS / Supersingular elliptic curve / Cryptography / Abstract algebra / Algebra

An Introduction to Pairing-Based Cryptography Alfred Menezes Abstract. Bilinear pairings have been used to design ingenious protocols for such tasks as one-round three-party key agreement, identity-based encryption, and

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2013-10-27 06:53:30
27Elliptic curve cryptography / Cryptographic protocols / Key size / Diffie–Hellman key exchange / Elliptic curve / Elliptic Curve DSA / Whitfield Diffie / ECC patents / Elliptic curve Diffie–Hellman / Cryptography / Finite fields / Public-key cryptography

A Public-Key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography David J. Malan, Matt Welsh, Michael D. Smith Division of Engineering and Applied Sciences Harvard University {malan,mdw,smit

Add to Reading List

Source URL: www.eecs.harvard.edu

Language: English - Date: 2004-08-24 12:30:22
28Internet Key Exchange / Diffie–Hellman key exchange / Elliptic curve cryptography / Hellman / Key size / Request for Comments / XTR / Oakley protocol / Cryptography / Cryptographic protocols / Finite fields

Internet Engineering Task Force (IETF) Request for Comments: 5903 Obsoletes: 4753 Category: Informational ISSN: [removed]

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2010-06-11 19:22:25
29Elliptic curve cryptography / NSA Suite B Cryptography / Key / Public-key cryptography / Diffie–Hellman key exchange / Ephemeral key / Static key / Cryptography / Key management / Elliptic curve Diffie–Hellman

Microsoft Word - SuiteB_Implementer_G#[removed]doc

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2009-09-22 08:04:55
30Diffie–Hellman key exchange / Elliptic curve Diffie–Hellman / Cryptography / Cryptographic protocols / Public-key cryptography

How Secure is TextSecure? Tilman Frosch Christian Mainka Florian Bergsma J¨org Schwenk Christoph Bader Thorsten Holz

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-11-05 07:33:28
UPDATE