Back to Results
First PageMeta Content
Diffie–Hellman problem / Key-agreement protocol / Public-key cryptography / Key exchange / Elliptic curve cryptography / ID-based encryption / Internet Key Exchange / Boneh/Franklin scheme / Elliptic curve Diffie–Hellman / Cryptographic protocols / Cryptography / Diffie–Hellman key exchange


Weaknesses of the Boyd-Mao Deniable Authenticated key Establishment for Internet Protocols Jue-Sam Chou1 , Yalin Chen 2 , Ming-De Yang 3 1 Department of Information Management, Nanhua University Chiayi 622 Taiwan, R.O.C
Add to Reading List

Document Date: 2005-12-09 06:49:50


Open Document

File Size: 376,22 KB

Share Result on Facebook

City

Okinawa / Cambridge / /

Company

Z AB / MAC Z AB / Wilson / MAC F AB / /

Country

Japan / United Kingdom / /

/

IndustryTerm

Internet Protocols Jue-Sam Chou1 / agreement protocols / deniable authenticated key establishment protocols / identity-based authenticated key agreement protocol / establishment protocol / Internet protocols / Internet RFC / basic secure communication technologies / Internet key exchange protocol / agreement protocol / signature-based key exchange protocol / Internet application / establishment protocols / Internet Computing / deniable authentication protocol / Internet protocol Security / security services / Internet Key Exchange / /

Organization

Department of Information Management / National Tsing Hua University / /

Person

B. Therefore / Ming-De Yang / /

/

Product

Franklin / /

ProvinceOrState

New Brunswick / /

PublishedMedium

the Theory of Computing / Cryptology ePrint Archive / Lecture Notes in Computer Science / /

Technology

identity-based authenticated key agreement protocol / basic secure communication technologies / key agreement protocol / Identity-based encryption / Diffie-Hellman key exchange protocol / Internet protocols / private key / Security Protocols / secret key / key agreement protocols / Encryption / cryptography / deniable authentication protocol / public key / Internet protocol / signature-based key exchange protocol / two deniable authenticated key establishment protocols / deniable authenticated key establishment protocols / key establishment protocols / key establishment protocol / Internet key exchange protocol / /

SocialTag