1![Revisiting Proxy Re-Encryption: Forward Secrecy, Improved Security, and Applications David Derler1 , Stephan Krenn2 , Thomas Lor¨ unser2 , Sebastian Ramacher1 , 2 Daniel Slamanig , and Christoph Striecks2 Revisiting Proxy Re-Encryption: Forward Secrecy, Improved Security, and Applications David Derler1 , Stephan Krenn2 , Thomas Lor¨ unser2 , Sebastian Ramacher1 , 2 Daniel Slamanig , and Christoph Striecks2](https://www.pdfsearch.io/img/55a6badcdba8598740f1cf6550d72a16.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2018-05-03 11:03:06
|
---|
2![Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice](https://www.pdfsearch.io/img/0fdb7e80cdd2e5cf8d9f9d9eaa49e512.jpg) | Add to Reading ListSource URL: benvds.comLanguage: English - Date: 2018-09-18 11:06:16
|
---|
3![0-RTT Key Exchange with Full Forward Secrecy Felix Günther Technische Universität Darmstadt, Germany 0-RTT Key Exchange with Full Forward Secrecy Felix Günther Technische Universität Darmstadt, Germany](https://www.pdfsearch.io/img/f9a67a4db77040713b6e0a5033a7e018.jpg) | Add to Reading ListSource URL: rwc.iacr.orgLanguage: English - Date: 2017-05-31 03:05:39
|
---|
4![Intro to Onion Routing Sphinx: A Compact and Provably Secure Mix Format HORNET: High-speed Onion Routing at the Network Layer Forward Secrecy Security Assumptions Future Directions Intro to Onion Routing Sphinx: A Compact and Provably Secure Mix Format HORNET: High-speed Onion Routing at the Network Layer Forward Secrecy Security Assumptions Future Directions](https://www.pdfsearch.io/img/cac944d5ddcc2aa3a7182261f805c9b3.jpg) | Add to Reading ListSource URL: scalingbitcoin.orgLanguage: English - Date: 2016-10-08 10:07:33
|
---|
5![Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice](https://www.pdfsearch.io/img/e6cb375a1a7e679bd4a82d2365c70bbb.jpg) | Add to Reading ListSource URL: benjaminvandersloot.comLanguage: English - Date: 2018-05-07 11:00:06
|
---|
6![Imperfect Forward Secrecy How Diffie-Hellman Fails in Practice David Adrian, Karthikeyan Bhargavan, Zakir Durumeric, Pierrick Gaudry, Matthew Green, J. Alex Halderman, Nadia Heninger, Drew Springall, Emmanuel Thom´e, Imperfect Forward Secrecy How Diffie-Hellman Fails in Practice David Adrian, Karthikeyan Bhargavan, Zakir Durumeric, Pierrick Gaudry, Matthew Green, J. Alex Halderman, Nadia Heninger, Drew Springall, Emmanuel Thom´e,](https://www.pdfsearch.io/img/1ea787df09f4e85ecc4761e81cd1ea2f.jpg) | Add to Reading ListSource URL: ecc2015.math.u-bordeaux1.fr- Date: 2015-09-27 09:29:28
|
---|
7![Proceedings - NN - Password Authenticated Key Agreement for Contactless Smart Cards Proceedings - NN - Password Authenticated Key Agreement for Contactless Smart Cards](https://www.pdfsearch.io/img/fa0b8ba09d204b0e1fbb7fdcc7db52fc.jpg) | Add to Reading ListSource URL: events.iaik.tugraz.atLanguage: English - Date: 2008-07-17 01:45:53
|
---|
8![Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice](https://www.pdfsearch.io/img/ae77f6509e4b1f8b33f7856ae57ce535.jpg) | Add to Reading ListSource URL: weakdh.org.Language: English - Date: 2015-10-15 14:53:20
|
---|
9![Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice](https://www.pdfsearch.io/img/503072ba2ea9fd133409b4dd42f3959c.jpg) | Add to Reading ListSource URL: aaspring.comLanguage: English - Date: 2015-08-21 16:58:21
|
---|
10![Factoring RSA Keys With TLS Perfect Forward Secrecy Florian Weimer Red Hat Product Security SeptemberAbstract Factoring RSA Keys With TLS Perfect Forward Secrecy Florian Weimer Red Hat Product Security SeptemberAbstract](https://www.pdfsearch.io/img/ff74a1c0ccf66f6b1918bc56c517c69a.jpg) | Add to Reading ListSource URL: people.redhat.comLanguage: English - Date: 2015-09-02 09:27:18
|
---|