Key-agreement protocol

Results: 124



#Item
61Cryptography standards / Implicit certificate / MQV / SECG / Research In Motion / Elliptic Curve DSA / Key-agreement protocol / Digital signature / ECC patents / Cryptography / Public-key cryptography / Cryptographic protocols

Microsoft Word - Certicom secg_patent.dot

Add to Reading List

Source URL: www.secg.org

Language: English - Date: 2015-01-29 09:45:08
62Security / Cryptographic software / Password / Bluetooth / Near field communication / Man-in-the-middle attack / S/KEY / OTPW / Key-agreement protocol / Technology / Cryptography / Wireless

Attacks on the Pairing Protocol of Bluetooth v2.1 Andrew Y. Lindell∗ June 25, 2008 Abstract The Bluetooth protocol for close-range wireless communication has been a huge success. It

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:40
63Public-key cryptography / Key / Alice and Bob / Password-authenticated key agreement / SPEKE / Cryptography / Cryptographic protocols / Key-agreement protocol

Microsoft PowerPoint - nm-extractors

Add to Reading List

Source URL: www.cs.nyu.edu

Language: English - Date: 2013-12-19 22:46:32
64Quantum information science / Quantum key distribution / Key-agreement protocol / Internet Key Exchange / IPsec / BB84 / Man-in-the-middle attack / Internet Security Association and Key Management Protocol / Alice and Bob / Cryptography / Cryptographic protocols / Quantum cryptography

Quantum Cryptography in Practice Chip Elliott Dr. David Pearson Dr. Gregory Troxel

Add to Reading List

Source URL: conferences.sigcomm.org

Language: English - Date: 2003-07-24 11:26:24
65National security / Computing / Public safety / Inter-process communication / Virtual synchrony / Key management / Computer security / Diffie–Hellman key exchange / Key-agreement protocol / Cryptographic protocols / Security / Crime prevention

High-Performance Secure Group Communication by Cristina Nita-Rotaru

Add to Reading List

Source URL: www.dsn.jhu.edu

Language: English - Date: 2013-09-20 16:47:28
66Information / Communications protocol / Burrows–Abadi–Needham logic / Key-agreement protocol / Authentication protocol / Dolev-Yao model / Protocol / Public-key cryptography / Station-to-Station protocol / Cryptographic protocols / Cryptography / Data

NRL Release Number[removed]What Makes a Cryptographic Protocol Secure? The Evolution of Requirements Speci cation in Formal Cryptographic Protocol Analysis Catherine Meadows

Add to Reading List

Source URL: www.nrl.navy.mil

Language: English - Date: 2013-04-26 15:14:05
67Public-key cryptography / Message authentication code / Key-agreement protocol / Key / Public key infrastructure / AKA / Symmetric-key algorithm / Cryptographic key types / Internet security / Cryptography / Cryptographic protocols / Key management

Microsoft Word - D200 2-Updated22Jan2010.doc

Add to Reading List

Source URL: www.foi.se

Language: English - Date: 2012-06-18 09:13:05
68Crime prevention / National security / Ueli Maurer / Outline of cryptography / Information security / Key-agreement protocol / Elliptic curve cryptography / ETH Zurich / Digital signature / Cryptography / Cryptographic protocols / Computer security

Information Security and Cryptography Fundamentals and Applications June 1-3, 2015 Zurich, Switzerland

Add to Reading List

Source URL: www.infsec.ch

Language: English - Date: 2014-11-20 07:42:12
69Information / Internet protocols / Password-authenticated key agreement / Password / Secure Remote Password protocol / Cryptographic protocols / Cryptography / Data

Two-Server Password-Authenticated Secret Sharing UC-Secure Against Transient Corruptions ? Jan Camenisch1 , Robert R. Enderlein1,2 , and Gregory Neven1 {jca,enr,nev}@zurich.ibm.com 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-05 05:22:56
70Password-authenticated key agreement / Password / Diffie–Hellman key exchange / Man-in-the-middle attack / IEEE P1363 / XTR / Password Authenticated Key Exchange by Juggling / Cryptographic protocols / Cryptography / SPEKE

The SPEKE Protocol Revisited Feng Hao, Siamak F. Shahandashti Newcastle University, UK {feng.hao, siamak.shahandashti}@ncl.ac.uk Abstract. The SPEKE protocol is commonly considered one of the classic Password Authentica

Add to Reading List

Source URL: homepages.cs.ncl.ac.uk

Language: English - Date: 2014-09-25 17:19:13
UPDATE