Back to Results
First PageMeta Content
Key-agreement protocol / Diffie–Hellman key exchange / Public-key cryptography / Key management / Perfect forward secrecy / Password authentication protocol / Man-in-the-middle attack / YAK / SILC / Cryptography / Cryptographic protocols / MQV


Overview of Key Agreement Protocols Ratna Dutta and Rana Barua Stat-Math Unit
Add to Reading List

Document Date: 2005-10-04 07:51:24


Open Document

File Size: 290,25 KB

Share Result on Facebook

Company

Wilson / Hess / MTI / /

/

Event

FDA Phase / /

Facility

Math Unit Indian Statistical Institute / /

Holiday

Assumption / /

IndustryTerm

elliptic curve additive / dynamic authenticated group key agreement protocol / secure protocols / tripartite key agreement protocol / basic tools / agreement protocols / public key infrastructure / personal communications / asynchronous network / higher-level protocols / insecure public network / multi-party group key agreement protocols / lossy and high-delay unbalanced network / distributed computing / i.e. / identified / basic setup protocol / authenticated key agreement protocol / secure key agreement protocols / agreement protocol / certificate-based public key infrastructure / wired/wireless networks / restricted power devices / basic protocol / insecure network / cryptographic protocols / wireless environments / authenticated key agreement protocols / Law et al. / protocol translation tool / Notable solutions / constant round group key agreement protocol / authenticated group key agreement protocol / few key agreement protocols / cube protocols / party key agreement protocols / party single round key agreement protocol / communication-efficient dynamic group key agreement protocol / octopus protocols / unauthenticated key agreement protocol / finite multiplicative / /

Organization

Diffie-Hellman / Indian Statistical Institute / /

Person

Rana Barua / /

Position

WB / wB / formal security model for group / security model for distributed computing / trustee / wB / group leader / rA WB / representative / Private / /

Product

Franklin / Diffie-Hellman / A0 / Joux / C0 / /

ProvinceOrState

Alaska / California / /

Technology

2-round unauthenticated protocol / few key agreement protocols / public key infrastructure / higher-level protocols / 2-round basic protocol / ID-based 2-party key agreement protocols / basic setup protocol / PKI / key agreement protocol / IDbased key agreement protocol / The protocol / provably secure protocols / basic Diffie-Hellman protocol / private key / two protocols / secret key / Joux protocol / key agreement protocols / ID-based encryption / secure key agreement protocols / unauthenticated protocol / tripartite key agreement protocol / mobile devices / encryption / tripartite Diffie-Hellman protocol / cryptography / round key agreement protocol / two-party key agreement protocols / cube protocols / unauthenticated key agreement protocol / BD protocol / classical Diffie-Hellman key agreement protocol / authenticated key agreement protocols / public key / ID-based key agreement protocol / unauthenticated BD protocol / octopus protocols / agreement protocols / MQV protocol / 2-party DH protocol / ID-based cryptographic protocols / 3-round generalized protocol / DLP / AKC protocols / digital signature / authenticated key agreement protocol / four protocols / certificate-based protocols / two party key agreement protocols / Diffie-Hellman protocol / /

SocialTag