Back to Results
First PageMeta Content
Diffie–Hellman key exchange / RSA / XTR / Password / Key / Secure Remote Password protocol / Password-authenticated key agreement / Cryptography / Cryptographic protocols / SPEKE


Secure Sessions from Weak Secrets Michael Roe1 Bruce Christianson2 David Wheeler3 1
Add to Reading List

Document Date: 2010-08-20 09:24:39


Open Document

File Size: 202,44 KB

Share Result on Facebook

Company

Hatfield 3 Computer Laboratory / /

Currency

pence / /

Event

FDA Phase / /

Facility

University of Hertfordshire / University of Cambridge Computer Science Department / University of Cambridge / /

IndustryTerm

handheld device / slow noncryptographic outer protocol / suitable algorithm / cryptographic protocols / outer “wrapping” protocol / system-level protocols / outer protocol / tamper-proof hardware / e.g. search / cryptographic algorithm / passive search / exhaustive search / /

Organization

Cambridge Computer Science Department / University of Cambridge / University of Hertfordshire / /

Person

Furthermore / Remainder Theorem / /

Product

B. The / S3P / /

Technology

2 The protocols / EG protocol / one protocol / public key / S3P protocols / three-message protocol / suitable algorithm / inner S3P protocol / slow noncryptographic outer protocol / sneakernet / system-level protocols / S3P protocol / RSA protocol / outer protocol / RSA-based protocol / cryptographic protocols / present three protocols / cryptographic algorithm / DH protocol / /

SocialTag