<--- Back to Details
First PageDocument Content
Off-the-Record Messaging / Key-agreement protocol / Diffie–Hellman key exchange / Public-key cryptography / Secure communication / Man-in-the-middle attack / Secure Shell / MQV / Internet Key Exchange / Cryptographic protocols / Cryptography / Deniable authentication
Date: 2005-09-03 05:31:59
Off-the-Record Messaging
Key-agreement protocol
Diffie–Hellman key exchange
Public-key cryptography
Secure communication
Man-in-the-middle attack
Secure Shell
MQV
Internet Key Exchange
Cryptographic protocols
Cryptography
Deniable authentication

Secure Off-the-Record Messaging Mario Di Raimondo

Add to Reading List

Source URL: www.dmi.unict.it

Download Document from Source Website

File Size: 153,64 KB

Share Document on Facebook

Similar Documents

Elliptic curve cryptography / Elliptic Curve Digital Signature Algorithm / Elliptic curve / Multiplier / Multiplication algorithm / CLMUL instruction set / MQV

Two is the fastest prime Thomaz Oliveira 1 Julio L´ opez 2 Diego F. Aranha Francisco Rodr´ıguez-Henr´ıquez 1 1 2

DocID: 1pvIu - View Document

Proof of knowledge / Finite fields / IP / Zero-knowledge proof / Random oracle / NP / XTR / MQV / Cryptography / Cryptographic protocols / Cryptographic hash functions

An Efficient Identification Protocol and the Knowledge-of-Exponent Assumption J. Wu∗ and D.R. Stinson† David R. Cheriton School of Computer Science University of Waterloo, Waterloo, ON, Canada {j32wu, dstinson}@uwate

DocID: 14Pub - View Document

Signcryption / Key management / Diffie–Hellman key exchange / MQV / Perfect forward secrecy / Key Wrap / Three-pass protocol / Station-to-Station protocol / Cryptography / Cryptographic protocols / Public-key cryptography

One-Pass HMQV and Asymmetric Key-Wrapping Shai Halevi Hugo Krawczyk IBM Research December 22, 2010

DocID: 12NRv - View Document

MQV / Mathematics / Functions and mappings / Function

TECS WeekProtocol Composition Logic

DocID: 122Hx - View Document

Public-key cryptography / Elliptic curve Diffie–Hellman / Diffie–Hellman key exchange / YAK / Electronic money / Digital signature / Elliptic Curve DSA / MQV / Shared secret / Cryptography / Cryptographic protocols / Bitcoin

Authenticated Key Exchange over Bitcoin Patrick McCorry, Siamak F. Shahandashti, Dylan Clarke, Feng Hao Newcastle University, UK {patrick.mccorry,siamak.shahandashti,dylan.clarke,feng.hao}@ncl.ac.uk Abstract. Bitcoin is

DocID: 10JW6 - View Document