| Document Date: 2015-04-09 11:27:47 Open Document File Size: 1,37 MBShare Result on Facebook
City Abstract Lattice / Leuven / / Company NXP Semiconductors / Microsoft / / Currency USD / / / Event FDA Phase / / Facility USA Queensland University of Technology / CyaSSL library / OpenSSL library / / IndustryTerm Internet-Draft / classical algorithm / probabilistic algorithm / password-authenticated key exchange protocol / quantum algorithm / present key exchange protocols / lattice-basis reduction algorithms / search problem / secure key agreement protocol / unauthenticated key exchange protocol / different algorithms / post-quantum authenticated key exchange protocol / search algorithm / agreement protocol / web servers / recent lattice-based key agreement protocol / into existing network / basic key exchange protocol / simulation algorithm / software implementation / reduction algorithms / web server / efficient algorithms / Apache web server / / NaturalFeature confidential channel / / Organization Queensland University of Technology / Brisbane / Australian Research Council / African Union / / Person Alice Bob / / Position SVP / IND-CPA / standard security model for TLS / / Product KV09 / DR08 / DXL12 / Pei14 / Section / DH76 / / Technology reduction algorithms / unauthenticated key exchange protocol / R-LWE algorithms / provably secure key agreement protocol / similar DH-like protocol / Hellman-like protocol / quantum algorithm / R-LWE protocol / HMQV-like key exchange protocol / search algorithm / efficient algorithms / key exchange protocol / password-authenticated key exchange protocol / R-LWE key exchange protocol / key exchange protocols / key agreement protocol / DH-like protocol / recent lattice-based key agreement protocol / private key / secret key / R-LWE algorithm / lattice-basis reduction algorithms / existing network protocols / basic key exchange protocol / Hellman-like key exchange protocol / probabilistic algorithm / public key encryption / encryption / BKZ-2.0 simulation algorithm / post-quantum authenticated key exchange protocol / cryptography / TLS protocol / public key / Hellman protocol / HTTP / present key exchange protocols / simulation / logarithm-based DH protocol / different algorithms / web server / /
SocialTag |