Back to Results
First PageMeta Content



Formal Proofs of Cryptographic Security of Diffie-Hellman-based Protocols ? Arnab Roy1 , Anupam Datta2 , John C. Mitchell1 1 2
Add to Reading List

Document Date: 2010-08-24 12:32:41


Open Document

File Size: 468,59 KB

Share Result on Facebook

City

Hellman / /

Company

U.S. Army Research / Technology Center TRUST / computational PCL / Secure Information Systems / Microsoft / /

/

Event

FDA Phase / Business Partnership / /

Facility

Carnegie Mellon University / Stanford University / /

IndustryTerm

network security protocols / virtual private networks / probabilistic polynomial-time algorithm / intermediate protocol / revised standard key management protocol / proof systems / standardized protocols / controversial3 Internet Key Exchange / network protocols / secretive protocol / secretive protocols / /

OperatingSystem

Microsoft Windows / /

Organization

U.S. Army Research Office / National Science Foundation / Stanford University / Carnegie Mellon University / Pittsburgh / /

Position

IND-CPA / MS-IND-CPA / /

Product

DHKE / A0 / IKEv2 / CTX0 / DH0 / /

SportsLeague

Stanford University / /

Technology

encryption / Diffie-Hellman-based Protocols / Diffie-Hellman-based key exchange protocols / cryptography / public key / Modelling protocols / example protocol / secretive protocol / network security protocols / intermediate protocol / 3.2 Secretive Protocols / private key / two protocols / secret key / probabilistic polynomial-time algorithm / simulation / key management protocol / network protocols / /

SocialTag