DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» Key exchange
Key exchange
Authentication in Key-Exchange: Definitions, Relations and Composition
2.3 Diffie–Hellman Key Exchange
Elliptic Curves in Public Key Cryptography: the Diffie Hellman
Study on the Use of Cryptographic Techniques in Europe
Public Key Infrastructure (PKI)
Analysing and Patching SPEKE in ISO/IEC
Lecture 19: Public-Key Cryptography (Diffie-Hellman Key Exchange & Elgamal Encryption)
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
Public Key Cryptography
Schnorr-Based Implicit Certification
New Key Exchange Protocol Based on Mandelbrot and Julia Fractal Sets Mohammad Ahmad Alia and Azman Bin Samsudin
Example:The Diffie-Hellman Key Exchange
Post-Quantum Authenticated Key Exchange from Ideal Lattices
Multivariable Public–Key Cryptosystems
Strong Password-Only Authenticated Key Exchange *
Public Key Cryptography Diffie-Hellman Key Establishment
Key Exchange and Public Key Cryptography Topics
Public-Key Encryption, Key Exchange, Digital Signatures CMSC 23200/33250, Autumn 2018, Lecture 7
Top View
Quantum Resistant Public Key Cryptography: a Survey
Key Exchange Diffie-Hellman Key Exchange Discrete Logarithms
LISP Data-Plane Cryptography Draft-Ietf-Lisp-Crypto-01
ITL Bulletin Secure Management of Keys in Cryptographic Applications
Assignment-8 with Answer Hints
4312 NTT Software Corporation Category: Standards Track S. Moriai Sony Computer Entertainment Inc
Key Agreement Protocol and Key Exchange Protocol
On the Importance of Public-Key Validation in the MQV and HMQV Key Agreement Protocols
THE DIFFIE-HELLMAN KEY EXCHANGE in MATRICES OVER a FIELD and a RING by JOSHUA B. NELSON, B.A. a THESIS in MATHEMATICS Submitted
Guidelines on Cryptographic Algorithms Usage and Key Management
Algebraic Generalization of Diffie–Hellman Key Exchange
Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attacks
Certificates, Digital Signatures, and the Diffie-Hellman Key Exchange Algorithm Lecture Notes On
FLAT: Federated Lightweight Authentication for the Internet of Things
A Public Key Exchange Cryptosystem Based on Ideal Secrecy
Modelling Trust Structures for Public Key Infrastructures*
An Overview of Key Exchange Protocols
Secure Packager and Encoder Key Exchange API Specification
Evidence That XTR Is More Secure Than Supersingular Elliptic Curve Cryptosystems
Ratcheted Encryption and Key Exchange: the Security of Messaging
Asymmetric (Public-Key) Encryption
CS 261 Notes: Secure Messaging
Design and Implementation of Public Key Infrastructure on Smart Card Operating System
The XTR Public Key System
Internet Key Exchange (IKE) with MQV
Diffie-Hellman Key Exchange
LNCS 9065, Pp
A Probabilistic Trust Model for Gnupg
Secure Key Exchange and Sessions Without Credentials
Public Key Exchange Scheme That Is Addressable (PKA)
Lecture 8, Public-Key Cryptography and Key Agreement 1 Introduction 2
Related-Key Rectangle Attack on 42-Round SHACAL-2
A Public-Key Infrastructure for Key Distribution in Tinyos Based on Elliptic Curve Cryptography
HMQV: a High-Performance Secure Diffie-Hellman Protocol
Secure Packager and Encoder Key Exchange (SPEKE)
An Introduction to the Uses of ECC-Based Certificates
ECRYPT II Yearly Report on Algorithms and Keysizes (2011-2012)
Elliptic Curve Cryptography and Diffie- Hellman Key Exchange
An Analysis of 5 Million Openpgp Keys
Password Authenticated Key Exchange by Juggling a Key Exchange Protocol Without PKI
Ding Key Exchange Advantages, Limitations and Applications Cryptic Analysis Conclusion Q&A
Diffie-Hellman:Key Exchange and Public Key Cryptosystems
SPEKE-Revisited
The SPEKE Protocol Revisited
Key Exchange Using Ternary System to Enhance Security
Recommendation for Key Management, Part 3: Application
Simple Password-Based Encrypted Key Exchange Protocols
Key Management Protocol with Implicit Certificates for Iot Systems
Auth. Key Exchange
TLS, PACE, and EAC: a Cryptographic View at Modern Key Exchange Protocols
PGP/GPG Vs. PKI Laura Raderman Who Am I?
Practical and Tightly-Secure Digital Signatures and Authenticated Key Exchange
A Lightweight Public Key Infrastructure for the Mobile Environments
Standards for Authentication and Key Establishment
Jini Distributed Key Exchange and File Transfer Service with Digital Signatures
Research Article an XTR-Based Constant Round Key Agreement Scheme
NTRU-KE: a Lattice-Based Public Key Exchange Protocol
Diffie-Hellman Key Exchange