<--- Back to Details
First PageDocument Content
Diffie–Hellman problem / Key-agreement protocol / Public-key cryptography / Key exchange / Elliptic curve cryptography / ID-based encryption / Internet Key Exchange / Boneh/Franklin scheme / Elliptic curve Diffie–Hellman / Cryptographic protocols / Cryptography / Diffie–Hellman key exchange
Date: 2005-12-09 06:49:50
Diffie–Hellman problem
Key-agreement protocol
Public-key cryptography
Key exchange
Elliptic curve cryptography
ID-based encryption
Internet Key Exchange
Boneh/Franklin scheme
Elliptic curve Diffie–Hellman
Cryptographic protocols
Cryptography
Diffie–Hellman key exchange

Weaknesses of the Boyd-Mao Deniable Authenticated key Establishment for Internet Protocols Jue-Sam Chou1 , Yalin Chen 2 , Ming-De Yang 3 1 Department of Information Management, Nanhua University Chiayi 622 Taiwan, R.O.C

Add to Reading List

Source URL: eprint.iacr.org

Download Document from Source Website

File Size: 376,22 KB

Share Document on Facebook

Similar Documents

Post-quantum key exchange for the Internet based on lattices Joppe Bos, Craig Costello, Léo Ducas, Ilya Mironov, Michael Naehrig, Valeria Nikolaenko, Ananth Raghunathan, Douglas Stebila  Part 1:

Post-quantum key exchange for the Internet based on lattices Joppe Bos, Craig Costello, Léo Ducas, Ilya Mironov, Michael Naehrig, Valeria Nikolaenko, Ananth Raghunathan, Douglas Stebila Part 1:

DocID: 1v3VQ - View Document

Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols ∗ William Aiello AT&T Labs Research

Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols ∗ William Aiello AT&T Labs Research

DocID: 1v3dI - View Document

Implementing Internet Key Exchange (IKE) Niklas Hallqvist Applitron Datasystem AB  Angelos D. Keromytis

Implementing Internet Key Exchange (IKE) Niklas Hallqvist Applitron Datasystem AB Angelos D. Keromytis

DocID: 1t0ZF - View Document

Cryptography / E-commerce / Stock market / Key management / Public key infrastructure / Public-key cryptography / Password / Electronic trading / Certificate authority / Futures exchange / Security / Computer security

Guide to ensure information and communications security In the information society and globalized world of today, people are becoming more and more connected to their computers and the Internet. As a result, electronic t

DocID: 1rsa9 - View Document

Cryptography / Public-key cryptography / Public key infrastructure / Cryptographic protocols / Key management / Transport Layer Security / Public key certificate / X.509 / Certificate authority / Transmission Control Protocol / Internet Key Exchange

Item Title Consolidated iTC Feedback – DNcPPv2 SD Reviewer iTC Editorial Team Item Identifier NDcPPv2 Supporting Document

DocID: 1r0j0 - View Document