Key-agreement protocol

Results: 124



#Item
1

Merkle’s Key Agreement Protocol is Optimal: An O(n2) Attack on any Key Agreement from Random Oracles Boaz Barak∗ Mohammad Mahmoody†

Add to Reading List

Source URL: www.cs.virginia.edu

Language: English - Date: 2013-09-26 12:37:31
    2

    The X3DH Key Agreement Protocol Moxie Marlinspike Trevor Perrin (editor) Revision 1,

    Add to Reading List

    Source URL: signal.org

    Language: English - Date: 2018-01-17 14:27:58
      3Cryptography / Key management / Public-key cryptography / Public key infrastructure / DiffieHellman key exchange / Key-agreement protocol / Information-theoretic security / IEEE 802.11 / RSA / Key generation / Key distribution / Secure channel

      Random Channel Hopping Schemes for Key Agreement in Wireless Networks Bin Zan Marco Gruteser

      Add to Reading List

      Source URL: www.winlab.rutgers.edu

      Language: English - Date: 2011-08-05 21:36:39
      4Cryptography / Public-key cryptography / Key management / Public key infrastructure / Transport Layer Security / Public key certificate / Certificate authority / Revocation list / Online Certificate Status Protocol / Root certificate / KPN / Certification Practice Statement

      Relying Party Agreement - versionThe Relying Party Agreement (RPA) below applies to certificates issued by KPN. However, the certificate that referred you to this page may have been issued by an organization with

      Add to Reading List

      Source URL: certificaat.kpn.com

      Language: English - Date: 2016-06-28 10:00:02
      5Cryptography / ISO standards / Ubiquitous computing / Computer security / Prevention / Computer access control / Password / Contactless smart card / Challengeresponse authentication / Key-agreement protocol / Smart card / Key

      Password Authenticated Key Agreement for Contactless Smart Cards Dennis Kügler1, Heike Neumann2, Sebastian Stappert2, Markus Ullmann1, Matthias Vögeler2 1

      Add to Reading List

      Source URL: events.iaik.tugraz.at

      Language: English - Date: 2008-07-17 01:45:14
      6Wireless networking / Wireless sensor network / Cryptographic protocols / Key management / Code division multiple access / Bootstrapping Server Function / Key distribution / Generic Bootstrapping Architecture / Authentication and Key Agreement / ZigBee / Lightweight Extensible Authentication Protocol / ANT

      ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

      Add to Reading List

      Source URL: www.ijmetmr.com

      Language: English - Date: 2015-01-23 01:39:57
      7Public-key cryptography / ISO standards / Ubiquitous computing / Elliptic curve cryptography / Cryptography / Key-agreement protocol / DiffieHellman key exchange / Elliptic curve DiffieHellman / Contactless smart card / Security token / Smart card / Forward secrecy

      Proceedings - NN - Password Authenticated Key Agreement for Contactless Smart Cards

      Add to Reading List

      Source URL: events.iaik.tugraz.at

      Language: English - Date: 2008-07-17 01:45:53
      8

      A Modular Security Analysis of the TLS Handshake Protocol P. Morrissey, N.P. Smart and B. Warinschi Abstract We study the security of the widely deployed Secure Session Layer/Transport Layer Security (TLS) key agreement

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2008-06-02 08:20:40
        9Cryptography / Finite fields / Computational hardness assumptions / Password-authenticated key agreement / Password Authenticated Key Exchange by Juggling / SPEKE / DiffieHellman problem / Zero-knowledge proof / XTR / Digital signature / Proof of knowledge

        Security of the J-PAKE Password-Authenticated Key Exchange Protocol Michel Abdalla Fabrice Benhamouda

        Add to Reading List

        Source URL: www.normalesup.org

        Language: English - Date: 2015-03-20 08:39:27
        10

        Published in Electronics Letters , Vol. 34, No. 18, pp. 1738–1739, SeptemberImproved authenticated multiple-key agreement protocol Cryptanalysis of Harn-Lin scheme: One straightforward modification of the abov

        Add to Reading List

        Source URL: joye.site88.net

        Language: English - Date: 2015-09-04 19:44:16
          UPDATE