Key-agreement protocol

Results: 124



#Item
101SPEKE / Password Authenticated Key Exchange by Juggling / Encrypted key exchange / Diffie–Hellman key exchange / Password / Public-key cryptography / IEEE P1363 / Key exchange / Authentication / Cryptographic protocols / Cryptography / Password-authenticated key agreement

Password Authenticated Key Exchange by Juggling - A key exchange protocol without PKI

Add to Reading List

Source URL: homepages.cs.ncl.ac.uk

Language: English - Date: 2008-04-16 17:16:56
102Password-authenticated key agreement / Electronic commerce / Password / Two-factor authentication / Man-in-the-middle attack / Biometrics / Security token / RSA / Authentication / Cryptography / Security / Cryptographic protocols

Security Analysis of a Multi-Factor Authenticated Key Exchange Protocol Feng Hao, Dylan Clarke School of Computing Science Newcastle University {feng.hao, dylan.clarke}@ncl.ac.uk

Add to Reading List

Source URL: homepages.cs.ncl.ac.uk

Language: English - Date: 2012-01-30 18:16:54
103MQV / Key-agreement protocol / Public-key cryptography / Password-authenticated key agreement / Alice and Bob / XTR / Key authentication / Station-to-Station protocol / Diffie–Hellman key exchange / Cryptography / Cryptographic protocols / YAK

On Robust Key Agreement Based on Public Key Authentication (Short Paper) Feng Hao Thales E-Security, Cambridge, UK [removed]

Add to Reading List

Source URL: homepages.cs.ncl.ac.uk

Language: English - Date: 2011-12-25 18:38:22
104Password Authenticated Key Exchange by Juggling / Password-authenticated key agreement / Password / Man-in-the-middle attack / XTR / IEEE P1363 / Public-key cryptography / Interlock protocol / Diffie–Hellman key exchange / Cryptography / Cryptographic protocols / SPEKE

Cryptanalysis of the Dragony Key Exchange Protocol Dylan Clarke, Feng Hao ∗

Add to Reading List

Source URL: homepages.cs.ncl.ac.uk

Language: English - Date: 2013-06-26 17:27:57
105Random oracle / Public-key cryptography / Authentication protocol / Smart card / Key-agreement protocol / Perfect forward secrecy / Cryptography / Cryptographic protocols / Advantage

A Cryptographic Analysis of OPACITY ¨ ur Dagdelen Ozg¨ Marc Fischlin Tommaso Gagliardoni Giorgia Azzurra Marson

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-04-22 11:29:49
106Password-authenticated key agreement / SPEKE / Diffie–Hellman key exchange / Key-agreement protocol / Password / Encrypted key exchange / Public-key cryptography / Man-in-the-middle attack / GEC / Cryptographic protocols / Cryptography / Password Authenticated Key Exchange by Juggling

Password Authenticated Key Exchange by Juggling Feng Hao⋆1 and Peter Ryan2 1 2

Add to Reading List

Source URL: homepages.cs.ncl.ac.uk

Language: English - Date: 2008-04-30 07:42:46
107Password-authenticated key agreement / SPEKE / Password / Diffie–Hellman key exchange / Small subgroup confinement attack / Key-agreement protocol / XTR / Encrypted key exchange / Subgroup / Cryptographic protocols / Cryptography / Secure Remote Password protocol

On Small Subgroup Non-confinement Attack Feng Hao Thales E-Security, Cambridge, UK [removed] Abstract—The small subgroup confinement attack works by

Add to Reading List

Source URL: homepages.cs.ncl.ac.uk

Language: English - Date: 2010-04-26 16:33:56
108Civil law / Public key certificate / World Intellectual Property Organization / Property law / Law / Intellectual property law / Madrid system / Trademark law

INFORMATION NOTICE NO[removed]Madrid Agreement and Protocol Concerning the International Registration of Marks New Layout of Certificates of International Registrations

Add to Reading List

Source URL: www.wipo.int

Language: English - Date: 2013-06-25 11:00:19
109Internet / Telecommunications engineering / SevOne / Netflow / Cisco IOS / Cisco Systems / Service-level agreement / Internet protocol suite / Router / Computing / Network architecture / Service Assurance Agent

Cisco IP SLA Application Note Overview Network Operations teams need to continuously ensure that the network is capable of supporting key business applications that serve the business. This includes being able to verify

Add to Reading List

Source URL: www.sevone.com

Language: English - Date: 2013-08-28 16:13:16
110Authentication protocol / Diffie–Hellman key exchange / Public-key cryptography / Password authentication protocol / Random oracle / Key-agreement protocol / Cryptography / Cryptographic protocols / Internet protocols

Authentication for Paranoids: Multi-Party Secret Handshakes Stanislaw Jarecki, Jihye Kim, and Gene Tsudik Computer Science Department University of California, Irvine {stasio, jihyek, gts}@ics.uci.edu

Add to Reading List

Source URL: www.ics.uci.edu

Language: English - Date: 2006-07-12 12:31:28
UPDATE