DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» MQV
MQV
DRAFT Special Publication 800-56A, Recommendation for Pair-Wise Key
Guidelines on Cryptographic Algorithms Usage and Key Management
Public Key
On Robust Key Agreement Based on Public Key Authentication Feng Hao Thales E-Security, Cambridge, UK
[email protected]
The Whole Is Less Than the Sum of Its Parts: Constructing More Efficient Lattice-Based Akes Rafael Del Pino, Vadim Lyubashevsky, David Pointcheval
The Odd Couple: MQV and HMQV
NIST) Quantum Computing Will Break Many Public-Key Cryptographic Algorithms/Schemes ◦ Key Agreement (E.G
BC FIPS Java Description
Recommendation for Key Management, Part 1: General Publication Date(S) January 2016 Withdrawal Date May 4, 2020 Withdrawal Note SP 800-57 Part 1 Rev
Example:The Diffie-Hellman Key Exchange
H. Krawczyk, IBM Reasearch R. Barnes, O. Friel, Cisco N. Sullivan
Year 2010 Issues on Cryptographic Algorithms
The Factoring Dead: Preparing for the Cryptopocalypse
Key Agreement Protocol Based on EC-MQV Algorithm for Cooperative Wireless
Multi-Use Unidirectional Proxy Re-Signatures Benoît Libert, Damien Vergnaud
Key Establishmnet Schemes Workshop Document
PKCS #11 Cryptographic Token Interface Current Mechanisms Specification Version 3.00
The 2Nd Round of the NIST PQC Standardization Process
Top View
NIST Status Update on Elliptic Curves and Post-Quantum Crypto
Comments Received on the Recommendation for Draft SP 800-56 Key Establishment Schemes
Comparative Analysis of Cryptography Library in Iot
On the Importance of Public-Key Validation in the MQV and HMQV Key Agreement Protocols
Information Security and Cryptography Texts and Monographs Series Editors Ueli Maurer Ronald L
Encryption § Digital Signature § Anonymity Protocols § Etc
A Closer Look at PKI: Security and Efficiency
Lightweight and Escrow-Less Authenticated Key Agreement for the Internet of Things
Challenges in Proving Post-Quantum Key Exchanges Based on Key Encapsulation Mechanisms
Hybrid Encryption in the Multi-User Setting
Report on Pairing-Based Cryptography
The Cryptographic Module Validation Program and FIPS 140-2
Guidelines on Cryptographic Algorithms Usage and Key Management
Cryptanalysis of the Dragonfly Key Exchange Protocol
View the Index
Recommendation for Pair-Wise Key Establishment Using Discrete Logarithm Cryptography
Cryptography in a Post-Quantum World
SEC 1: Elliptic Curve Cryptography
On the Cryptographic Deniability of the Signal Protocol
KRIPTOGRAFI STUDI MENGENAI MQV (Menezes-Qu-Vanstone)
X9.42–2003 Public Key Cryptography for the Financial Services Industry
An Overview of Key Exchange Protocols
Design and Analysis of Symmetric Cryptographic Algorithms
Cryptanalysis of the Dragonfly Key Exchange Protocol
A Standards for Authentication and Key Establishment
CMVP Status and FIPS 140-1&2
ECE 646 – Fall 2015 Term Project Overview, Comparison of Open Crypto Libraries for Application Development
Internet Key Exchange (IKE) with MQV
Advances in Elliptic Curve Cryptographylondon Mathematical Society Lecture Note Series ;
IEEE Standard Specifications for Public-Key Cryptography
The Elliptic Curve Cryptography Cofactor Diffie-Hellman (ECC CDH) Primitive Validation System (ECC CDHVS)
HMQV: a High-Performance Secure Diffie-Hellman Protocol
HMQV: a High-Performance Secure Diffie-Hellman Protocol
SEC 1: Elliptic Curve Cryptography
An Introduction to the Uses of ECC-Based Certificates
ECRYPT II Yearly Report on Algorithms and Keysizes (2011-2012)
Cryptographic Schemes Based on Elliptic Curve Pairings
P1363-2: Standard Specifications for Password-Based Public-Key Cryptography
Authenticated Diffie–Hellman Key Agreement Protocols
ECC and Digital Postage Marks
Efficient Embedded Security Standards (EESS) EESS #1
Quantum Safety in Certified Cryptographic Modules
An Alternative Diffie-Hellman Protocol
NIST.SP.800-175Br1.Pdf
An Alternative Diffie-Hellman Protocol
Daot: Dynamic and Energy-Aware Authentication for Smart Home Appliances in Internet of Things
Towards Post-Quantum Security for Signal's X3DH Handshake
Algorithms, Key Sizes and Parameters Report 2013 Recommendations Version 1.0 – October 2013
Recommendation for Pair-Wise Key Establishment Schemes Using
ANOTHER LOOK at HMQV 1. Introduction the MQV Protocols [27]
NTRU-KE: a Lattice-Based Public Key Exchange Protocol